Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mode11_buqd.exe

Overview

General Information

Sample name:mode11_buqd.exe
Analysis ID:1583718
MD5:061c6604a402b997dd6aced94ceaff5e
SHA1:33f3301b7c351637527e2fca7189989c5a7f3803
SHA256:4a3341b1a681826f08bc9ec90ca24459826bb28f909030ba522d5ae2c92467d7
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Performs DNS queries to domains with low reputation
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mode11_buqd.exe (PID: 7360 cmdline: "C:\Users\user\Desktop\mode11_buqd.exe" MD5: 061C6604A402B997DD6ACED94CEAFF5E)
    • conhost.exe (PID: 7368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 8443, "SleepTime": 12000, "MaxGetSize": 1403642, "Jitter": 60, "C2Server": "632313373.xyz,/js/jquery-3.3.1.min.js", "HttpPostUri": "/post", "Malleable_C2_Instructions": ["Remove 1522 bytes from the end", "Remove 4016 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 17500, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "SetThreadContext", "CreateRemoteThread", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": "Host: 632313373.xyz\r\n"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
    00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
      • 0x32760:$a39: %s as %s\%s: %d
      • 0x41be2:$a41: beacon.x64.dll
      • 0x33970:$a46: %s (admin)
      • 0x328d8:$a48: %s%s: %s
      • 0x3278c:$a50: %02d/%02d/%02d %02d:%02d:%02d
      • 0x327b8:$a50: %02d/%02d/%02d %02d:%02d:%02d
      • 0x339d9:$a51: Content-Length: %d
      00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
      • 0x1d93c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
      00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
      • 0x1956a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      • 0x1a89b:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      Click to see the 20 entries
      SourceRuleDescriptionAuthorStrings
      0.2.mode11_buqd.exe.c000102000.7.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
      • 0x4513c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
      0.2.mode11_buqd.exe.c000102000.7.unpackWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
      • 0x40d6a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      • 0x4209b:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
        0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
          0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
            Click to see the 17 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnuAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsVAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsHAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsabAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsRAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt:Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsNAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js$Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookiesAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsDAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsOAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/Avira URL Cloud: Label: malware
            Source: https://632313373.xyz/Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js8Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdezAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jslAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jskAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderHAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js2Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphyAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3Avira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/DcAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderAAvira URL Cloud: Label: malware
            Source: 632313373.xyzAvira URL Cloud: Label: malware
            Source: https://632313373.xyz:8443/js/jquery-3.3.1.min.js/Avira URL Cloud: Label: malware
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 8443, "SleepTime": 12000, "MaxGetSize": 1403642, "Jitter": 60, "C2Server": "632313373.xyz,/js/jquery-3.3.1.min.js", "HttpPostUri": "/post", "Malleable_C2_Instructions": ["Remove 1522 bytes from the end", "Remove 4016 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 17500, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "SetThreadContext", "CreateRemoteThread", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": "Host: 632313373.xyz\r\n"}
            Source: mode11_buqd.exeReversingLabs: Detection: 21%
            Source: mode11_buqd.exeVirustotal: Detection: 25%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
            Source: mode11_buqd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: 632313373.xyz
            Source: DNS query: 632313373.xyz
            Source: global trafficTCP traffic: 192.168.2.5:49724 -> 188.114.96.3:8443
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757BE68C _snprintf,_snprintf,_snprintf,InternetQueryDataAvailable,InternetReadFile,InternetCloseHandle,0_2_0000025C757BE68C
            Source: global trafficDNS traffic detected: DNS query: 632313373.xyz
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/gsr1.crl0
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r4.crl0
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/we1/PCUeQViQlYc.crl0
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/gsr1.crt0-
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r4.crt0
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/we1.crt
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/we1.crt0
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/s/we1/lk00%
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz/
            Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/
            Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/Dc
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js$
            Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js/
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js2
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3
            Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.js8
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsD
            Source: mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsH
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnu
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsN
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsO
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsR
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsV
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsab
            Source: mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsder
            Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderA
            Source: mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderH
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdez
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookies
            Source: mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphy
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsk
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsl
            Source: mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt:
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://632313373.xyz:8443/js/jquery-3.3.1.min.jsr
            Source: mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
            Source: mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/what?indextype=1&__cfduid=
            Source: mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EBA1000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036539520.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462820088.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/what?indextype=1&__cfduid=GZW54oS6Gn_3HDDEOVbu04tVtOzZbJnhQvE7m469jmEnCoTJ8cr

            System Summary

            barindex
            Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: Process Memory Space: mode11_buqd.exe PID: 7360, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCAAB00_2_0000025C73FCAAB0
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FC12640_2_0000025C73FC1264
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FA916C0_2_0000025C73FA916C
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FC19280_2_0000025C73FC1928
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FC59140_2_0000025C73FC5914
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCCFF00_2_0000025C73FCCFF0
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCB7B00_2_0000025C73FCB7B0
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FB6F380_2_0000025C73FB6F38
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCC6800_2_0000025C73FCC680
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FA96800_2_0000025C73FA9680
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FACE3C0_2_0000025C73FACE3C
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCE6000_2_0000025C73FCE600
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FBF5A80_2_0000025C73FBF5A8
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FC239C0_2_0000025C73FC239C
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FCC3970_2_0000025C73FCC397
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FC03740_2_0000025C73FC0374
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FB03340_2_0000025C73FB0334
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757DDBF00_2_0000025C757DDBF0
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757C7B380_2_0000025C757C7B38
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757D1E640_2_0000025C757D1E64
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757D25280_2_0000025C757D2528
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757D2F9C0_2_0000025C757D2F9C
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757DD2800_2_0000025C757DD280
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757D01A80_2_0000025C757D01A8
            Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.mode11_buqd.exe.c000102000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: Process Memory Space: mode11_buqd.exe PID: 7360, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.winEXE@2/0@1/1
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7368:120:WilError_03
            Source: mode11_buqd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\mode11_buqd.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: mode11_buqd.exeReversingLabs: Detection: 21%
            Source: mode11_buqd.exeVirustotal: Detection: 25%
            Source: mode11_buqd.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned" not supported for cpu option "MapIter.Value called before Nextuse of closed network connectioncrypto/aes: output not full blockCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyW142108547152020037174224853515625710542735760100185871124267578125too many levels of symbolic linksslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of rangeruntime: type offset out of rangeGODEBUG: no value specified for "reflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangewaiting for unsupported file typecrypto/aes: invalid buffer overlapillegal base64 data at input byte CM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModes3552713678800500929355621337890625too many references: cannot spliceslice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notreflect: Field of non-struct type reflect: Field index out of boundsreflect: string index out of rangeunexpected runtime.netpoll error: encoding/hex: odd length hex stringSubscribeServiceChangeNotifications1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped connection on resettransport endpoint is not connectedpersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid
            Source: mode11_buqd.exeString found in binary or memory: _cgo_pthread_key_created missingruntime: sudog with non-nil elemruntime: sudog with non-nil nextruntime: sudog with non-nil prevruntime: mcall function returnedruntime: newstack called from g=runtime: stack split at bad timepanic while printing panic valueruntime: setevent failed; errno=runtime.semasleep wait_abandoned" not supported for cpu option "MapIter.Value called before Nextuse of closed network connectioncrypto/aes: output not full blockCryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyW142108547152020037174224853515625710542735760100185871124267578125too many levels of symbolic linksslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of rangeruntime: type offset out of rangeGODEBUG: no value specified for "reflect: slice index out of range of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangewaiting for unsupported file typecrypto/aes: invalid buffer overlapillegal base64 data at input byte CM_Get_Device_Interface_List_SizeWSetFileCompletionNotificationModes3552713678800500929355621337890625too many references: cannot spliceslice bounds out of range [:%x:%y]slice bounds out of range [%x:%y:]out of memory allocating allArenas/memory/classes/heap/objects:bytesruntime.SetFinalizer: cannot pass too many pages allocated in chunk?mspan.ensureSwept: m is not lockedruntime: source value is too largeVirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notreflect: Field of non-struct type reflect: Field index out of boundsreflect: string index out of rangeunexpected runtime.netpoll error: encoding/hex: odd length hex stringSubscribeServiceChangeNotifications1776356839400250464677810668945312588817841970012523233890533447265625ryuFtoaFixed32 called with prec > 9network dropped connection on resettransport endpoint is not connectedpersistentalloc: align is too large/memory/classes/heap/released:bytesgreyobject: obj not pointer-alignedmismatched begin/end of activeSweepmheap.freeSpanLocked - invalid
            Source: mode11_buqd.exeString found in binary or memory: C:/Program Files/Go/src/net/addrselect.go
            Source: unknownProcess created: C:\Users\user\Desktop\mode11_buqd.exe "C:\Users\user\Desktop\mode11_buqd.exe"
            Source: C:\Users\user\Desktop\mode11_buqd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: mode11_buqd.exeStatic file information: File size 3906560 > 1048576
            Source: mode11_buqd.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x2dc400
            Source: mode11_buqd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: mode11_buqd.exeStatic PE information: section name: .xdata
            Source: mode11_buqd.exeStatic PE information: section name: .symtab
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C73FD776C push 0000006Ah; retf 0_2_0000025C73FD7784
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757E03FC push ebp; iretd 0_2_0000025C757E0401
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757BA35D push edi; iretd 0_2_0000025C757BA35E
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757BBD58 push ebp; iretd 0_2_0000025C757BBD59
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757DB84F push ebp; iretd 0_2_0000025C757DB850
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757DB898 push ebp; iretd 0_2_0000025C757DB899
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757DB86F push ebp; iretd 0_2_0000025C757DB870
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757BA71E push cs; retf 0_2_0000025C757BA71F
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757BC91C pushad ; retf 0_2_0000025C757BC91D
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757C0901 push ebx; iretd 0_2_0000025C757C0902
            Source: C:\Users\user\Desktop\mode11_buqd.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\mode11_buqd.exeLast function: Thread delayed
            Source: mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\mode11_buqd.exeCode function: 0_2_0000025C757C5E28 GetUserNameA,GetModuleFileNameA,strrchr,_snprintf,0_2_0000025C757C5E28
            Source: C:\Users\user\Desktop\mode11_buqd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.mode11_buqd.exe.25c73fa0000.12.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.mode11_buqd.exe.25c73fa0000.12.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.mode11_buqd.exe.c000102000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mode11_buqd.exe PID: 7360, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Process Injection
            OS Credential Dumping1
            Query Registry
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Obfuscated Files or Information
            LSASS Memory1
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            Account Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
            System Owner/User Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
            System Information Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            mode11_buqd.exe21%ReversingLabs
            mode11_buqd.exe25%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnu100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsV100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsH100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsab100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsR100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt:100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsN100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js$100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookies100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsD100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsO100%Avira URL Cloudmalware
            https://632313373.xyz:8443/100%Avira URL Cloudmalware
            https://632313373.xyz/100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js8100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdez100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsl100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsder100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsk100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderH100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js2100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphy100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js3100%Avira URL Cloudmalware
            https://632313373.xyz:8443/Dc100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderA100%Avira URL Cloudmalware
            632313373.xyz100%Avira URL Cloudmalware
            https://632313373.xyz:8443/js/jquery-3.3.1.min.js/100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            632313373.xyz
            188.114.96.3
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              632313373.xyztrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://o.pki.goog/s/we1/lk00%mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsJWnumode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsVmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://632313373.xyz:8443/js/jquery-3.3.1.min.js$mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://i.pki.goog/we1.crt0mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://632313373.xyz:8443/js/jquery-3.3.1.min.js3011b87bd06mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://632313373.xyz:8443/js/jquery-3.3.1.min.jsabmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://c.pki.goog/r/gsr1.crl0mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://632313373.xyz:8443/js/jquery-3.3.1.min.jsHmode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://632313373.xyz:8443/js/jquery-3.3.1.min.js3/mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://632313373.xyz:8443/js/jquery-3.3.1.min.jsnt:mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://632313373.xyz:8443/js/jquery-3.3.1.min.jsRmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://www.google.com/what?indextype=1&__cfduid=mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://632313373.xyz:8443/js/jquery-3.3.1.min.jsNmode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://632313373.xyz:8443/js/jquery-3.3.1.min.jsOmode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://632313373.xyz:8443/js/jquery-3.3.1.min.jsetCookiesmode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://www.google.com/what?indextype=1&__cfduid=GZW54oS6Gn_3HDDEOVbu04tVtOzZbJnhQvE7m469jmEnCoTJ8crmode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EBA1000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036539520.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462820088.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://632313373.xyz:8443/js/jquery-3.3.1.min.js8mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://632313373.xyz:8443/js/jquery-3.3.1.min.jsmode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://c.pki.goog/we1/PCUeQViQlYc.crl0mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284305766.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2422666108.0000025C2EB9E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://632313373.xyz:8443/mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://632313373.xyz:8443/js/jquery-3.3.1.min.jsDmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://i.pki.goog/gsr1.crt0-mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664245105.0000025C2EB9A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462633796.0000025C2EBAB000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdezmode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://c.pki.goog/r/r4.crl0mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://632313373.xyz/mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://632313373.xyz:8443/js/jquery-3.3.1.min.jslmode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://i.pki.goog/r4.crt0mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3462654993.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2284354764.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB4A000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542926635.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348615326.0000025C2EB9C000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB9B000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2421425639.0000025C2EB99000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EBA2000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441215662.0000025C2EB92000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2441180034.0000025C2EB9F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.js0acc1ce4a71mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsdermode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.jskmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EACC000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderHmode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsgraphymode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.js2mode11_buqd.exe, 00000000.00000003.2664283324.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB32000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB2D000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB2F000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://632313373.xyz:8443/js/jquery-3.3.1.min.jsrmode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  https://www.google.com/mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB31000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://632313373.xyz:8443/js/jquery-3.3.1.min.js3mode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://632313373.xyz:8443/Dcmode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://i.pki.goog/we1.crtmode11_buqd.exe, 00000000.00000003.2542943666.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000002.3470887253.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2664149314.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2419891640.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2385867049.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://632313373.xyz:8443/js/jquery-3.3.1.min.jsderAmode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://632313373.xyz:8443/js/jquery-3.3.1.min.js/mode11_buqd.exe, 00000000.00000003.3036646515.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmp, mode11_buqd.exe, 00000000.00000003.2348525114.0000025C2EB62000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      188.114.96.3
                                      632313373.xyzEuropean Union
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1583718
                                      Start date and time:2025-01-03 13:04:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 5s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:5
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:mode11_buqd.exe
                                      Detection:MAL
                                      Classification:mal100.troj.winEXE@2/0@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      07:05:23API Interceptor60x Sleep call for process: mode11_buqd.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      188.114.96.3Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                      QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/u7ghXEYp/download
                                      CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                      • www.mffnow.info/1a34/
                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                      • www.mydreamdeal.click/1ag2/
                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                      • www.questmatch.pro/ipd6/
                                      QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/I7fmQg9d/download
                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                      • www.rtpwslot888gol.sbs/jmkz/
                                      QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/Bh1Kj4RD/download
                                      http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                      • kklk16.bsyo45ksda.top/favicon.ico
                                      QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                      • filetransfer.io/data-package/XrlEIxYp/download
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      632313373.xyzm.exeGet hashmaliciousCobaltStrikeBrowse
                                      • 188.114.97.3
                                      svchostinter.exeGet hashmaliciousCobaltStrikeBrowse
                                      • 172.67.175.230
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUShttp://t1.awagama2.orgGet hashmaliciousUnknownBrowse
                                      • 188.114.96.3
                                      m.exeGet hashmaliciousCobaltStrikeBrowse
                                      • 188.114.97.3
                                      http://www.escudier-sas.frGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                      • 104.18.11.207
                                      Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 188.114.96.3
                                      Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                      • 188.114.97.3
                                      http://www.technoafriwave.rwGet hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      dropper.exeGet hashmaliciousUnknownBrowse
                                      • 1.1.1.1
                                      ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                      • 188.114.97.3
                                      W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      No context
                                      No context
                                      No created / dropped files found
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):6.665784376667119
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:mode11_buqd.exe
                                      File size:3'906'560 bytes
                                      MD5:061c6604a402b997dd6aced94ceaff5e
                                      SHA1:33f3301b7c351637527e2fca7189989c5a7f3803
                                      SHA256:4a3341b1a681826f08bc9ec90ca24459826bb28f909030ba522d5ae2c92467d7
                                      SHA512:b608b066313d20354179ed89a594789cdb200c242b2b66974678f45ee47c19e7aaa65cdbc66c5aa0b6521fea414cacdb2c2a1d4ec7043c07837c2100b0ac75b9
                                      SSDEEP:49152:+UgD5mHuE0r0VOjjC4mkZMyITWt1U4yP21Qsq8VT/0+2Cw2:tpGm
                                      TLSH:3D06DF0BBCE159B5C0AE92328A7661567A71BC040F3267D73A90B37C2F77BD09A36744
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.........;......."..........n................@...............................@...........`... ............................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x46ec80
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:1
                                      File Version Major:6
                                      File Version Minor:1
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:1
                                      Import Hash:d42595b695fc008ef2c56aabd8efd68e
                                      Instruction
                                      jmp 00007F52708F44F0h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push ebp
                                      dec eax
                                      mov ebp, esp
                                      pushfd
                                      cld
                                      dec eax
                                      sub esp, 000000E0h
                                      dec eax
                                      mov dword ptr [esp], edi
                                      dec eax
                                      mov dword ptr [esp+08h], esi
                                      dec eax
                                      mov dword ptr [esp+10h], ebp
                                      dec eax
                                      mov dword ptr [esp+18h], ebx
                                      dec esp
                                      mov dword ptr [esp+20h], esp
                                      dec esp
                                      mov dword ptr [esp+28h], ebp
                                      dec esp
                                      mov dword ptr [esp+30h], esi
                                      dec esp
                                      mov dword ptr [esp+38h], edi
                                      movups dqword ptr [esp+40h], xmm6
                                      movups dqword ptr [esp+50h], xmm7
                                      inc esp
                                      movups dqword ptr [esp+60h], xmm0
                                      inc esp
                                      movups dqword ptr [esp+70h], xmm1
                                      inc esp
                                      movups dqword ptr [esp+00000080h], xmm2
                                      inc esp
                                      movups dqword ptr [esp+00000090h], xmm3
                                      inc esp
                                      movups dqword ptr [esp+000000A0h], xmm4
                                      inc esp
                                      movups dqword ptr [esp+000000B0h], xmm5
                                      inc esp
                                      movups dqword ptr [esp+000000C0h], xmm6
                                      inc esp
                                      movups dqword ptr [esp+000000D0h], xmm7
                                      inc ebp
                                      xorps xmm7, xmm7
                                      dec ebp
                                      xor esi, esi
                                      dec eax
                                      mov eax, dword ptr [00387812h]
                                      dec eax
                                      mov eax, dword ptr [eax]
                                      dec eax
                                      cmp eax, 00000000h
                                      je 00007F52708F7D95h
                                      dec esp
                                      mov esi, dword ptr [eax]
                                      dec eax
                                      sub esp, 10h
                                      dec eax
                                      mov eax, ecx
                                      dec eax
                                      mov ebx, edx
                                      call 00007F527090236Bh
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x4010000x53e.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3fa0000x5370.pdata
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4020000x499c.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x39a1a00x178.data
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000xbbbfc0xbbc0010704d168259afefca014f0ac9decebfFalse0.47511130992010653data6.267032997413728IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0xbd0000x2dc3c00x2dc40005a92a6d9f4eed592bcedad622d664fcunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x39a0000x5fe400x16e0034ba11b22f7b7bfb4d342bf95dce2cf0False0.2855297984972678data3.2077796073927614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x3fa0000x53700x54006b7df8b45d2250e08eb91fb84ea19749False0.4015531994047619data4.9405195822402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .xdata0x4000000xb40x200d5a432b15ea1de5871ba1b040f244088False0.228515625shared library1.787112262798912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .idata0x4010000x53e0x6001eed92b78c29d6c28ea4846d7c7f7421False0.3776041666666667OpenPGP Public Key4.017189066074398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .reloc0x4020000x499c0x4a0007327396c5ce6db70861b1b3714f3a06False0.30938555743243246data5.393634428702928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .symtab0x4070000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      DLLImport
                                      kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, RtlVirtualUnwind, RtlLookupFunctionEntry, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler, AddVectoredContinueHandler
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 3, 2025 13:05:22.611025095 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:22.615816116 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:22.615891933 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:22.649436951 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:22.654274940 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.061463118 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.061476946 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.061490059 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.061532021 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:23.061572075 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:23.112175941 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:23.116980076 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.205585003 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:23.205643892 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:23.214257002 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:23.219075918 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265166044 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265187979 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265201092 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265216112 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265228033 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265234947 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.265264988 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.265311003 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.517345905 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.522819996 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.523075104 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.562658072 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.567475080 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.971374989 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.971712112 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.972045898 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.973237038 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:24.976826906 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:24.978065014 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.077950001 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.077975988 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.077987909 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.077999115 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.078010082 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.078022003 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.078036070 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.078071117 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.188170910 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.188782930 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.193115950 CET844349724188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.193620920 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.193698883 CET497248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.193744898 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.193969965 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.198760986 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.644179106 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.644244909 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.644794941 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.645905018 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:26.649694920 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:26.650660992 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732876062 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732896090 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732908010 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732953072 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.732974052 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732985973 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.732997894 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.733002901 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.733007908 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.733026981 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.733052969 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.844448090 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.852849960 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.858560085 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.858659029 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.858915091 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.863241911 CET844349736188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:27.863307953 CET497368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:27.863621950 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:28.310101986 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:28.310198069 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:28.310657024 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:28.311665058 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:28.315493107 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:28.316406012 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388050079 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388075113 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388087988 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388099909 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388111115 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388120890 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:29.388123989 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:29.388151884 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:29.388176918 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.266480923 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.271557093 CET844349747188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:34.271614075 CET497478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.278707981 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.283570051 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:34.283651114 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.284679890 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.290314913 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:34.737472057 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:34.737575054 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.738079071 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.739083052 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:34.742805958 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:34.743922949 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884190083 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884231091 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884236097 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884243011 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884260893 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884267092 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884273052 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:35.884320974 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:35.884356022 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.237179041 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.238013029 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.242111921 CET844349758188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:36.242172956 CET497588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.242815971 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:36.242875099 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.243503094 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.248328924 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:36.712846041 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:36.712914944 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.713288069 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.714198112 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:36.718041897 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:36.718972921 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886897087 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886918068 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886929035 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886939049 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886950016 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886961937 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:37.886961937 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:37.887001991 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:37.887027979 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.000730991 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.005772114 CET844349800188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:38.005825996 CET498008443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.010942936 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.015789032 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:38.015849113 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.016643047 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.021420002 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:38.468457937 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:38.468527079 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.499841928 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.504614115 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:38.506315947 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:38.511105061 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668828964 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668842077 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668853045 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668864965 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668875933 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668889046 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.668899059 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.668941975 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.781910896 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.782387972 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.786927938 CET844349814188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.786984921 CET498148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.787199020 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:39.787264109 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.787501097 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:39.792256117 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:40.249176979 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:40.249238968 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:40.249671936 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:40.254292965 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:40.254421949 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:40.259114027 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400815010 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400876999 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.400883913 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400896072 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400908947 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400914907 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400919914 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.400995016 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.801065922 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.801537991 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.806171894 CET844349828188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.806276083 CET498288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.806298971 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:41.806365013 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.806734085 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:41.811486959 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:42.272450924 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:42.272555113 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:42.279122114 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:42.280920982 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:42.283881903 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:42.285716057 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421152115 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421179056 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421191931 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421210051 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421221972 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421231985 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.421253920 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.421334982 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.531941891 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.537014961 CET844349840188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.537136078 CET498408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.539575100 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.544384956 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:43.544524908 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.544718981 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:43.549551010 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:44.005812883 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:44.005897045 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:44.006366014 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:44.007450104 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:44.011187077 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:44.012279034 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123351097 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123374939 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123388052 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123399973 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123413086 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.123414040 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123429060 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.123435974 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.123481989 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.236613035 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.237085104 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.241589069 CET844349855188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.241662979 CET498558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.241930962 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.242028952 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.242224932 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.246977091 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.716295958 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.716415882 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.716756105 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.717829943 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:45.721539021 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:45.722640038 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821583033 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821614981 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821634054 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821646929 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821659088 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821671963 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.821691990 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.821691990 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.821742058 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.969985008 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.970748901 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.975347042 CET844349865188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.975399017 CET498658443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.975534916 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:46.975599051 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.975917101 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:46.980643034 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:47.429527998 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:47.429682970 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:47.430124998 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:47.431205034 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:47.434964895 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:47.436042070 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585807085 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585827112 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585844040 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585855961 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585871935 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585880995 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.585884094 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585894108 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.585927963 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.585953951 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.688235998 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.688910007 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.693209887 CET844349877188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.693279982 CET498778443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.693672895 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:48.693737030 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.693939924 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:48.698703051 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:49.143007994 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:49.143071890 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:49.143667936 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:49.144835949 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:49.148392916 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:49.149647951 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239183903 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239212990 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239223003 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239238024 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239249945 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239254951 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.239260912 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239274025 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.239295959 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.239321947 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.344677925 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.345294952 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.355084896 CET844349888188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.355099916 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.355137110 CET498888443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.355185986 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.355511904 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.362809896 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.812189102 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.812254906 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.812589884 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.813661098 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:50.817399979 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:50.818922043 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955194950 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955208063 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955224991 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955235958 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955248117 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955260992 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955271006 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:51.955282927 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:51.955307961 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:51.955332994 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.063509941 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.063873053 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.068450928 CET844349901188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:52.068511963 CET499018443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.068751097 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:52.068813086 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.069003105 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.073770046 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:52.523055077 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:52.526674986 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.588228941 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.589294910 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:52.593010902 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:52.594018936 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704479933 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704502106 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704530001 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704547882 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704560041 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704565048 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.704572916 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.704602003 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.704631090 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.829066038 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.829473972 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.834125042 CET844349912188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.834239960 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:53.834311962 CET499128443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.834328890 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.834594011 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:53.839380026 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:54.302628040 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:54.308485985 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:54.308753967 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:54.309598923 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:54.313606977 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:54.314441919 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456538916 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456562996 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456579924 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456590891 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456603050 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456614017 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.456681013 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.456748962 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.563715935 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.564424992 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.568720102 CET844349925188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.568795919 CET499258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.569180012 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:55.569262981 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.569602966 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:55.574426889 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:56.033248901 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:56.033338070 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:56.033941984 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:56.035227060 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:56.038712978 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:56.040024996 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202199936 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202223063 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202234983 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202254057 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202265024 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202280998 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.202308893 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.202358961 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.202385902 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.292690039 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.292779922 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.407296896 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.407768965 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.412377119 CET844349938188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.412452936 CET499388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.412533045 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.412722111 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.413016081 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.417824984 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.886828899 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.887037039 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.887634993 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.888775110 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:57.892388105 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:57.893578053 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965150118 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965183020 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965210915 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965235949 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965255022 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965270996 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965289116 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:58.965306044 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:58.965362072 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.079144955 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.079906940 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.084218025 CET844349949188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:59.084295988 CET499498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.084687948 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:59.084770918 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.085081100 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.089823961 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:59.530833006 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:59.530934095 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.531255960 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.532464027 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:05:59.536036968 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:05:59.537220001 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630630970 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630647898 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630738020 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.630803108 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630814075 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630834103 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630877018 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.630882025 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630897999 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630903959 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.630913019 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.630929947 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.630959988 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.735151052 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.735718012 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.740140915 CET844349963188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.740372896 CET499638443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.740461111 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:00.740539074 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.740900040 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:00.745663881 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:01.189273119 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:01.189377069 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:01.189793110 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:01.190771103 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:01.194525003 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:01.195548058 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262794971 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262854099 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262866020 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262882948 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262893915 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.262919903 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.262960911 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.349622965 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.349736929 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.453941107 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.454371929 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.458899975 CET844349975188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.458970070 CET499758443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.459209919 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.459276915 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.459446907 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.464243889 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.924869061 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.924947977 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.925286055 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.926141977 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:02.930090904 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:02.930948019 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028028011 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028088093 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.028090954 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028104067 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028124094 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028136015 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028151989 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.028151989 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.028203011 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.141407967 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.141851902 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.146380901 CET844349986188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.146459103 CET499868443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.146652937 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.146722078 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.147069931 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.152554035 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.612986088 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.614782095 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.615082026 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.615999937 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:04.619889975 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:04.620773077 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711843967 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711921930 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711932898 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711942911 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711952925 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711975098 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.711982012 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.712028980 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.712049961 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.829054117 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.834032059 CET844349997188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.834085941 CET499978443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.846780062 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.851560116 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:05.851655006 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.851864100 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:05.856616020 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:06.307657957 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:06.307723999 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:06.308094025 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:06.308954000 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:06.312864065 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:06.313752890 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418584108 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418755054 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.418801069 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418812990 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418832064 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418844938 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418857098 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418867111 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.418915987 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.419013023 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.532093048 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.532726049 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.537159920 CET844350008188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.537254095 CET500088443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.537503958 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:07.537573099 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.537791014 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:07.542620897 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:08.002914906 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:08.003000975 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:08.003501892 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:08.004523993 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:08.008276939 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:08.009293079 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152870893 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152893066 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152909040 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152923107 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152968884 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.152975082 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.152992010 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.153003931 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.153186083 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.153186083 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.153186083 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.266510963 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.267146111 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.271768093 CET844350013188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.271862030 CET500138443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.271955967 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.272032976 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.272399902 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.277179003 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.739020109 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.739104986 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.739676952 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.740731955 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:09.745232105 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:09.746269941 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848618031 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848633051 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848644018 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848655939 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848668098 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848679066 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848690033 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.848773956 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.848834991 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.953969002 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.954585075 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.959013939 CET844350014188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.959094048 CET500148443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.959347963 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:10.959418058 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.961180925 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:10.965918064 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:11.407267094 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:11.407373905 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:11.407908916 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:11.408953905 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:11.412688971 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:11.413710117 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567748070 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567773104 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567785025 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567807913 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567817926 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567830086 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.567910910 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.567987919 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.672883987 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.673501015 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.677845955 CET844350015188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.677948952 CET500158443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.678287029 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:12.678356886 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.678561926 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:12.683382988 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:13.143018961 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:13.143143892 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:13.214557886 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:13.219409943 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:13.226347923 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:13.231117010 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313684940 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313699961 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313713074 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313730955 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313744068 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313755989 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.313767910 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.313801050 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.313828945 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.422590017 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.423085928 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.427697897 CET844350016188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.427774906 CET500168443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.427907944 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.427979946 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.428160906 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.432962894 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.874803066 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.874980927 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.875597000 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.876521111 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:14.880342007 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:14.881258011 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976259947 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976281881 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976294041 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976306915 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976320028 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976331949 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:15.976351976 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:15.976402998 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.140659094 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.141027927 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.145674944 CET844350018188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:16.145726919 CET500188443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.145821095 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:16.145884991 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.188951015 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.193809986 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:16.592426062 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:16.592508078 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.599442005 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.600979090 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:16.604233027 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:16.605726957 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683222055 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683252096 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683270931 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683290005 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683284998 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.683305025 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683327913 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.683334112 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.683334112 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.683334112 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.683348894 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.683357954 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.797933102 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.798371077 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.802922010 CET844350019188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.803168058 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:17.803251982 CET500198443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.803302050 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.803530931 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:17.808289051 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:18.291244984 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:18.291316986 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:18.291779995 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:18.293210983 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:18.296554089 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:18.298079014 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388829947 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388849974 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388864040 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388875008 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388887882 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.388895988 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.388926029 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.388956070 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.477677107 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.477778912 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.594403028 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.594844103 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.599371910 CET844350021188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.599554062 CET500218443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.599606037 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:19.599673986 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.599906921 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:19.604717970 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:20.047426939 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:20.048626900 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:20.048986912 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:20.049949884 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:20.053828001 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:20.054738998 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134613037 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134644032 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134655952 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134670019 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134684086 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134696007 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.134766102 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.134809971 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.250876904 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.251333952 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.255951881 CET844350022188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.256031036 CET500228443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.256155014 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.256218910 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.256478071 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.261240005 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.703814983 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.703896046 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.714912891 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.716006994 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:21.719686031 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:21.720741034 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841793060 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841845989 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841857910 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841865063 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.841870070 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841881990 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841895103 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.841909885 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.841909885 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.841933966 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.954701900 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.955192089 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.959825039 CET844350023188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.959908009 CET500238443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.959966898 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:22.960035086 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.960280895 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:22.965022087 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:23.407428026 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:23.407499075 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:23.407892942 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:23.408967018 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:23.412714005 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:23.413765907 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503142118 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503164053 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503174067 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503196001 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.503225088 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503235102 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.503237009 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503251076 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503259897 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.503271103 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.503289938 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.503315926 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.610985994 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.611479044 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.615946054 CET844350024188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.616044998 CET500248443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.616290092 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:24.616384983 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.616652012 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:24.621433973 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:25.064328909 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:25.064415932 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:25.064860106 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:25.065810919 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:25.069637060 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:25.070615053 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156326056 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156343937 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156356096 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156368017 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156384945 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156397104 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.156497002 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.156652927 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.267070055 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.267574072 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.272115946 CET844350025188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.272219896 CET500258443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.272351980 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.272422075 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.272684097 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.277488947 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.723587036 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.723675013 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.724097013 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.725095034 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:26.728893995 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:26.729845047 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.822945118 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823035955 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.823055029 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823066950 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823079109 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823091984 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823103905 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823113918 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.823116064 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.823163986 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.938941002 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.939371109 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.944103956 CET844350026188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.944194078 CET500268443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.944433928 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:27.944508076 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.944814920 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:27.949660063 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:28.398941994 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:28.399025917 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:28.399404049 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:28.400330067 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:28.404267073 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:28.405050993 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541547060 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541599035 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541613102 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541626930 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541629076 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.541647911 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.541650057 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541666985 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.541672945 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.541713953 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.657648087 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.658145905 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.662678957 CET844350027188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.662750959 CET500278443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.662934065 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:29.663130045 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.663400888 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:29.668236017 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:30.152127981 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:30.152240038 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:30.152734041 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:30.153572083 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:30.157593012 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:30.158421993 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251518965 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251559973 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251575947 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251590967 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251605988 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251621008 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251624107 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.251636028 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.251655102 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.251688004 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.360830069 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.361265898 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.366105080 CET844350028188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.366179943 CET500288443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.366213083 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.366276026 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.366494894 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.371709108 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.866579056 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.866669893 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.867129087 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.868041992 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:31.871867895 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:31.872792006 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959036112 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959052086 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959064007 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959089041 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959100962 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959111929 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:32.959130049 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:32.959170103 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.045736074 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.045813084 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.157665014 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.158149004 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.162617922 CET844350029188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.162694931 CET500298443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.162903070 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.162969112 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.163175106 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.167944908 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.617271900 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.617367029 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.617902994 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.618896008 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:33.622632980 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:33.623656034 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758203983 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758232117 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758244991 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758256912 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758270025 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:34.758272886 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758291006 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:34.758304119 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:34.758316994 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:34.758342028 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.689043999 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.689522982 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.694128990 CET844350030188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:39.694197893 CET500308443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.694386005 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:39.694457054 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.694696903 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:39.699501038 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:40.141120911 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:40.141304016 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:40.141691923 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:40.142769098 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:40.146503925 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:40.147583008 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220865011 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220937967 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220948935 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220961094 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220972061 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220982075 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.220992088 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.221016884 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.221076012 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.332519054 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.333000898 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.337584019 CET844350031188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.337820053 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.337908030 CET500318443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.337971926 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.338255882 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.343056917 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.783174038 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.784143925 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.784562111 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.787753105 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:41.789432049 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:41.792507887 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948049068 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948075056 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948086023 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948097944 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948110104 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948120117 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948131084 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:42.948234081 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:42.948571920 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.064451933 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.069449902 CET844350032188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:43.069508076 CET500328443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.094325066 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.099128008 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:43.099214077 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.099522114 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.104336977 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:43.543580055 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:43.543668032 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.544076920 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.545049906 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:43.548868895 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:43.549823046 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622539043 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622566938 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622577906 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622590065 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622605085 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622615099 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622632027 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.622626066 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.622661114 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.622680902 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.735835075 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.736308098 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.740823984 CET844350035188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.740895987 CET500358443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.741177082 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:44.741240978 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.741426945 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:44.746225119 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:45.202831984 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:45.202893972 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:45.203361034 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:45.204468966 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:45.208163023 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:45.209225893 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398222923 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398248911 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398261070 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398272038 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398283005 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398293972 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.398365021 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.398422003 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.501394033 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.501863956 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.506545067 CET844350036188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.506618977 CET500368443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.506654024 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.506726980 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.506997108 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.511748075 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.969646931 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.969733953 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.970099926 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.970990896 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:46.974858999 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:46.975826025 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110070944 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110106945 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110120058 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110132933 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110146046 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110161066 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.110188007 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.110219002 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.220396996 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.220777988 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.225493908 CET844350037188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.225536108 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.225569963 CET500378443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.225615978 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.225824118 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.230577946 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.690120935 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.690226078 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.690656900 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.691545010 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:48.696360111 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:48.696641922 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879127026 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879143000 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879164934 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879179001 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879192114 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879204035 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879209042 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.879216909 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.879256010 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.879272938 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.985970020 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.986643076 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.991008997 CET844350038188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.991099119 CET500388443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.991417885 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:49.991492987 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.991678953 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:49.996486902 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:50.448807001 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:50.448919058 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:50.449383974 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:50.450318098 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:50.454205036 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:50.455267906 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569675922 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569693089 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569719076 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569732904 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569746971 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569827080 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.569907904 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569933891 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.569998980 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.569998980 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.569998980 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.673605919 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.674046993 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.678706884 CET844350039188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.678829908 CET500398443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.678939104 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:51.679025888 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.680217028 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:51.684961081 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:52.146142960 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:52.146207094 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:52.146680117 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:52.147694111 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:52.151492119 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:52.152518988 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270606995 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270633936 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270647049 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270661116 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270673037 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270693064 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270701885 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.270706892 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.270736933 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.270782948 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.376470089 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.376949072 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.381505966 CET844350040188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.381714106 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.381772041 CET500408443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.381793022 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.382066011 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.386816978 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.893146992 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.893232107 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.893632889 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.894573927 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:53.898422003 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:53.899365902 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018254042 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018271923 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018281937 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018291950 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018301964 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018313885 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.018330097 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.018376112 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.126686096 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.127347946 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.131756067 CET844350041188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.131825924 CET500418443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.132179022 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.132244110 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.132539034 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.137253046 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.599981070 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.600061893 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.600419998 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.601562977 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:55.605335951 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:55.607316017 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775198936 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775213957 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775224924 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775234938 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775247097 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775259018 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775270939 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.775269032 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.775321960 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.876543045 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.877084017 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.881597042 CET844350042188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.881680012 CET500428443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.881927013 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:56.882009983 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.882317066 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:56.887067080 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:57.332328081 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:57.332418919 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:57.332827091 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:57.333749056 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:57.337618113 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:57.338516951 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455354929 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455368996 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455387115 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455398083 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455410004 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455421925 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455434084 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.455553055 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.455553055 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.564003944 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.564502954 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.568974972 CET844350043188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.569057941 CET500438443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.569286108 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:58.569363117 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.569701910 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:58.574471951 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:59.090126038 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:59.090198040 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:59.090681076 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:59.091556072 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:06:59.095475912 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:06:59.096329927 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228527069 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228539944 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228550911 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228562117 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228573084 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228584051 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228594065 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.228610992 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.228648901 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.347162008 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.350454092 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.352066040 CET844350044188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.352159023 CET500448443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.355381012 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.355443954 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.356411934 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.361222029 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.802360058 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.802450895 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.802831888 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.803719997 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:00.807596922 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:00.808449030 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961422920 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961445093 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961457968 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961468935 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961481094 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961492062 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961503029 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:01.961575985 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:01.964627028 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.069480896 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.074454069 CET844350045188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:02.074527025 CET500458443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.130348921 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.135149002 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:02.135234118 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.138104916 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.142844915 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:02.591298103 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:02.591372013 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.596698046 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.598335981 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:02.601553917 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:02.603166103 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728625059 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728652954 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728666067 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728677034 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728688002 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728698969 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.728735924 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.728775024 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.831407070 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.831945896 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.836415052 CET844350046188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.836472034 CET500468443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.836767912 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:03.836832047 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.837044954 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:03.841792107 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:04.312342882 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:04.312436104 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:04.312860966 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:04.313832045 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:04.317679882 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:04.318615913 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453084946 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453182936 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.453211069 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453227043 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453239918 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453250885 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453257084 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.453262091 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453269958 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.453273058 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.453293085 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.453325987 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.565774918 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.566061974 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.570708036 CET844350047188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.570761919 CET500478443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.570825100 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:05.570890903 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.571208954 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:05.575949907 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:06.021224022 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:06.021337986 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:06.023576975 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:06.024522066 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:06.028507948 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:06.029406071 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.146964073 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.146985054 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.146996975 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.147008896 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.147021055 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.147032976 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.147058964 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.147077084 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.251297951 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.251754999 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.256251097 CET844350048188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.256313086 CET500488443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.256608009 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.256665945 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.256844044 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.261579990 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.722276926 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.722389936 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.722848892 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.723809004 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:07.727926016 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:07.728765011 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842616081 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842696905 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842710018 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842713118 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:08.842720985 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842732906 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842742920 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.842745066 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:08.842782974 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:08.842809916 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:08.933281898 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:08.933351040 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.047980070 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.048445940 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.053049088 CET844350049188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:09.053116083 CET500498443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.053256989 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:09.053425074 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.053690910 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.058445930 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:09.519998074 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:09.520178080 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.520590067 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.521538973 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:09.525356054 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:09.526364088 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597126961 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597150087 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597167969 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597179890 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597193003 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597192049 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:10.597203970 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597217083 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:10.597219944 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:10.597270012 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.610510111 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.611064911 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.615493059 CET844350050188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:15.615564108 CET500508443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.615926981 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:15.615997076 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.616199017 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:15.621000051 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:16.080429077 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:16.080523014 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:16.080940962 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:16.082123995 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:16.085669041 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:16.086875916 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149460077 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149472952 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149483919 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149496078 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149506092 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149517059 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.149535894 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.149740934 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.251338959 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.251725912 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.256232023 CET844350052188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.256303072 CET500528443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.256509066 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.256568909 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.256762028 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.261539936 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.722706079 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.722768068 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.723278046 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.724148989 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:17.728097916 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:17.728966951 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845767021 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845788002 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845807076 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845824957 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845829010 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.845835924 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845851898 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.845864058 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845875025 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.845890045 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.845904112 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.954261065 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.954725981 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.959233046 CET844350053188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.959341049 CET500538443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.959476948 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:18.959556103 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.959837914 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:18.964560986 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:19.405308962 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:19.405383110 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:19.405756950 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:19.406814098 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:19.410516977 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:19.411636114 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534241915 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534261942 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534277916 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534290075 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534291983 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.534301043 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534316063 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.534331083 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.534360886 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.534462929 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534472942 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.534508944 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.641726971 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.642294884 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.646748066 CET844350054188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.646812916 CET500548443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.647078991 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:20.647150040 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.647409916 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:20.652153015 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:21.107726097 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:21.107806921 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:21.108135939 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:21.109039068 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:21.112946033 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:21.113774061 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.240895987 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.240962029 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.240968943 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.240972996 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.240983963 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.240994930 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.241003036 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.241005898 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.241049051 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.345652103 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.347040892 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.350564003 CET844350055188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.350645065 CET500558443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.351875067 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.351965904 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.352158070 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.356954098 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.817439079 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.817504883 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.817893028 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.818932056 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:22.822680950 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:22.823652029 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894356966 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894370079 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894381046 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894397020 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894407988 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894418955 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:23.894491911 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:23.894507885 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.001178980 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.001856089 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.006098032 CET844350056188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:24.006148100 CET500568443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.006567955 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:24.006634951 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.006920099 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.011621952 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:24.465281010 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:24.465419054 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.465847969 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.466737032 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:24.470640898 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:24.471448898 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561881065 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561917067 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561929941 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561944962 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561968088 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.561969995 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.561983109 CET844350058188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.562006950 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.562050104 CET500588443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.677608013 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.683768988 CET844350057188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.683819056 CET500578443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.707391024 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.712944984 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:25.713056087 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.713321924 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:25.718588114 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:26.162846088 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:26.162925005 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:26.163331985 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:26.164422035 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:26.168083906 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:26.169241905 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228336096 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228360891 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228372097 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228414059 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228425980 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228436947 CET844350059188.114.96.3192.168.2.5
                                      Jan 3, 2025 13:07:27.228503942 CET500598443192.168.2.5188.114.96.3
                                      Jan 3, 2025 13:07:27.228718996 CET500598443192.168.2.5188.114.96.3
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 3, 2025 13:05:22.568569899 CET6538153192.168.2.51.1.1.1
                                      Jan 3, 2025 13:05:22.604547024 CET53653811.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 3, 2025 13:05:22.568569899 CET192.168.2.51.1.1.10x8e37Standard query (0)632313373.xyzA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 3, 2025 13:05:22.604547024 CET1.1.1.1192.168.2.50x8e37No error (0)632313373.xyz188.114.96.3A (IP address)IN (0x0001)false
                                      Jan 3, 2025 13:05:22.604547024 CET1.1.1.1192.168.2.50x8e37No error (0)632313373.xyz188.114.97.3A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:07:05:21
                                      Start date:03/01/2025
                                      Path:C:\Users\user\Desktop\mode11_buqd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\mode11_buqd.exe"
                                      Imagebase:0x420000
                                      File size:3'906'560 bytes
                                      MD5 hash:061C6604A402B997DD6ACED94CEAFF5E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3470228905.000000C000102000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:false

                                      Target ID:1
                                      Start time:07:05:21
                                      Start date:03/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:2.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:4.7%
                                        Total number of Nodes:212
                                        Total number of Limit Nodes:26
                                        execution_graph 34010 25c757d1b48 34012 25c757d1b64 _DllMainCRTStartup 34010->34012 34011 25c757d1bf4 34020 25c757d1bbe 34011->34020 34053 25c757c93e0 34011->34053 34012->34011 34012->34020 34022 25c757d19e8 34012->34022 34014 25c757d1c12 34016 25c757d1c3b 34014->34016 34018 25c757c93e0 _DllMainCRTStartup 14 API calls 34014->34018 34017 25c757d19e8 _CRT_INIT 2 API calls 34016->34017 34016->34020 34017->34020 34019 25c757d1c2e 34018->34019 34021 25c757d19e8 _CRT_INIT 2 API calls 34019->34021 34021->34016 34023 25c757d1a77 34022->34023 34026 25c757d19fa _heap_init 34022->34026 34024 25c757d1acd 34023->34024 34028 25c757d1a7b _CRT_INIT 34023->34028 34025 25c757d1b30 34024->34025 34032 25c757d1ad2 _CRT_INIT 34024->34032 34038 25c757d1a03 _CRT_INIT _mtterm 34025->34038 34081 25c757d5808 RtlFreeHeap _freefls _CRT_INIT 34025->34081 34026->34038 34059 25c757d59b0 RtlFreeHeap 6 library calls 34026->34059 34028->34038 34071 25c757cff6c RtlFreeHeap free 34028->34071 34031 25c757d1aa3 34031->34038 34072 25c757d816c RtlFreeHeap free 34031->34072 34032->34038 34073 25c757d4728 34032->34073 34035 25c757d1a0f _RTC_Initialize 34035->34038 34060 25c757d937c RtlFreeHeap free _malloc_crt 34035->34060 34036 25c757d1aef _CRT_INIT 34036->34038 34039 25c757d1b26 34036->34039 34040 25c757d1b10 34036->34040 34038->34011 34078 25c757cf244 34039->34078 34077 25c757d58ec RtlFreeHeap _ioinit _lock __addlocaleref 34040->34077 34043 25c757d1a31 34061 25c757d7e40 34043->34061 34045 25c757d1a3d 34045->34038 34070 25c757d8ee0 RtlFreeHeap __initmbctable parse_cmdline 34045->34070 34054 25c757c94bb 34053->34054 34055 25c757c9402 _DllMainCRTStartup 34053->34055 34144 25c757cb47c 34054->34144 34057 25c757c9407 _DllMainCRTStartup 34055->34057 34092 25c757bca74 34055->34092 34057->34014 34059->34035 34060->34043 34082 25c757d3d8c 34061->34082 34063 25c757d7e6f 34064 25c757d4728 _calloc_crt RtlFreeHeap 34063->34064 34069 25c757d7e83 34064->34069 34065 25c757d7e93 _ioinit 34065->34045 34066 25c757d4728 _calloc_crt RtlFreeHeap 34066->34069 34067 25c757d80ce GetFileType 34068 25c757d7f74 34067->34068 34068->34065 34068->34067 34069->34065 34069->34066 34069->34068 34071->34031 34072->34038 34076 25c757d474d 34073->34076 34075 25c757d478a 34075->34036 34076->34075 34087 25c757d9cec 34076->34087 34077->34038 34079 25c757cf249 RtlFreeHeap 34078->34079 34080 25c757cf264 _errno free 34078->34080 34079->34080 34080->34038 34081->34038 34083 25c757d3daf 34082->34083 34084 25c757d3daa 34082->34084 34086 25c757d3e58 RtlFreeHeap 7 library calls 34084->34086 34086->34083 34088 25c757d9d01 34087->34088 34090 25c757d9d14 _callnewh 34087->34090 34088->34090 34091 25c757d1d18 RtlFreeHeap _getptd_noexit 34088->34091 34090->34076 34091->34090 34156 25c757c5fec 34092->34156 34094 25c757bca92 _DllMainCRTStartup 34163 25c757cf284 34094->34163 34096 25c757bcb40 34174 25c757cc230 34096->34174 34102 25c757bcbb5 34103 25c757ceaa8 _DllMainCRTStartup RtlFreeHeap 34102->34103 34104 25c757bcbcf _DllMainCRTStartup 34103->34104 34106 25c757bcbdd _DllMainCRTStartup 34104->34106 34223 25c757cda74 RtlFreeHeap _DllMainCRTStartup 34104->34223 34107 25c757bcbf9 34106->34107 34224 25c757cda74 RtlFreeHeap _DllMainCRTStartup 34106->34224 34197 25c757bf1f8 34107->34197 34111 25c757bcc0e 34203 25c757bf274 34111->34203 34116 25c757bcc1c 34117 25c757cf284 malloc RtlFreeHeap 34116->34117 34118 25c757bcc4f 34117->34118 34119 25c757bcc5c 34118->34119 34227 25c757cda74 RtlFreeHeap _DllMainCRTStartup 34118->34227 34121 25c757ceaa8 _DllMainCRTStartup RtlFreeHeap 34119->34121 34122 25c757bcc78 34121->34122 34213 25c757c5c60 34122->34213 34145 25c757c5fec _DllMainCRTStartup RtlFreeHeap 34144->34145 34146 25c757cb4a0 memcpy_s _DllMainCRTStartup 34145->34146 34147 25c757cf284 malloc RtlFreeHeap 34146->34147 34148 25c757cb52d memcpy_s 34147->34148 34149 25c757ceaa8 _DllMainCRTStartup RtlFreeHeap 34148->34149 34150 25c757cb55e _DllMainCRTStartup 34149->34150 34154 25c757cb575 memcpy_s _DllMainCRTStartup 34150->34154 34293 25c757bf014 34150->34293 34152 25c757cb802 memcpy_s _DllMainCRTStartup 34152->34057 34153 25c757cf284 malloc RtlFreeHeap 34153->34154 34154->34152 34154->34153 34155 25c757ceaa8 _DllMainCRTStartup RtlFreeHeap 34154->34155 34155->34154 34157 25c757cf284 malloc RtlFreeHeap 34156->34157 34158 25c757c600d 34157->34158 34159 25c757cf284 malloc RtlFreeHeap 34158->34159 34162 25c757c6015 memcpy_s _DllMainCRTStartup 34158->34162 34160 25c757c6021 34159->34160 34161 25c757cf244 free RtlFreeHeap 34160->34161 34160->34162 34161->34162 34162->34094 34164 25c757cf318 _callnewh 34163->34164 34167 25c757cf29c _callnewh _mtinitlocknum 34163->34167 34232 25c757d1d18 RtlFreeHeap _getptd_noexit 34164->34232 34168 25c757cf30d 34167->34168 34170 25c757cf2fd 34167->34170 34172 25c757cf302 34167->34172 34228 25c757d1df0 RtlFreeHeap _NMSG_WRITE _set_error_mode 34167->34228 34229 25c757d1e64 RtlFreeHeap 7 library calls 34167->34229 34168->34096 34230 25c757d1d18 RtlFreeHeap _getptd_noexit 34170->34230 34231 25c757d1d18 RtlFreeHeap _getptd_noexit 34172->34231 34175 25c757cc259 _DllMainCRTStartup 34174->34175 34233 25c757d044c 34175->34233 34178 25c757cf284 malloc RtlFreeHeap 34180 25c757cc2a1 memcpy_s 34178->34180 34181 25c757cc30a 34180->34181 34236 25c757d181c 34180->34236 34182 25c757d181c _DllMainCRTStartup RtlFreeHeap 34181->34182 34183 25c757bcb87 34182->34183 34184 25c757c34a0 34183->34184 34185 25c757c34b3 _DllMainCRTStartup 34184->34185 34186 25c757d044c _DllMainCRTStartup RtlFreeHeap 34185->34186 34187 25c757c34bb 34186->34187 34252 25c757c2f5c 34187->34252 34190 25c757ceaa8 34191 25c757ceae7 34190->34191 34196 25c757ceafd memcpy_s 34190->34196 34192 25c757ceaf3 34191->34192 34193 25c757ceaff 34191->34193 34194 25c757cf284 malloc RtlFreeHeap 34192->34194 34257 25c757d1914 RtlFreeHeap _callnewh _errno free malloc 34193->34257 34194->34196 34196->34102 34199 25c757bf20e 34197->34199 34198 25c757bcc05 34198->34111 34225 25c757cda74 RtlFreeHeap _DllMainCRTStartup 34198->34225 34199->34198 34258 25c757ca8dc RtlFreeHeap _DllMainCRTStartup 34199->34258 34201 25c757bf248 34259 25c757ca914 RtlFreeHeap _snprintf _DllMainCRTStartup 34201->34259 34204 25c757bf299 34203->34204 34205 25c757bcc13 34204->34205 34206 25c757cf284 malloc RtlFreeHeap 34204->34206 34205->34116 34226 25c757cda74 RtlFreeHeap _DllMainCRTStartup 34205->34226 34207 25c757bf315 memcpy_s _DllMainCRTStartup 34206->34207 34208 25c757bf36b memcpy_s 34207->34208 34260 25c757ca8dc RtlFreeHeap _DllMainCRTStartup 34207->34260 34211 25c757cf244 free RtlFreeHeap 34208->34211 34210 25c757bf34c 34261 25c757ca914 RtlFreeHeap _snprintf _DllMainCRTStartup 34210->34261 34211->34205 34214 25c757c5c7e _DllMainCRTStartup 34213->34214 34262 25c757cb0b4 RtlFreeHeap _DllMainCRTStartup 34214->34262 34216 25c757c5ca8 34217 25c757d044c _DllMainCRTStartup RtlFreeHeap 34216->34217 34218 25c757c5cbf _DllMainCRTStartup 34217->34218 34263 25c757c5e28 34218->34263 34220 25c757c5d94 memcpy_s _DllMainCRTStartup 34273 25c757cabcc RtlFreeHeap memcpy_s _DllMainCRTStartup 34220->34273 34222 25c757c5df5 34228->34167 34229->34167 34230->34172 34231->34168 34232->34168 34239 25c757d5844 34233->34239 34235 25c757cc261 34235->34178 34237 25c757d5844 _getptd RtlFreeHeap 34236->34237 34238 25c757d1840 _call_reportfault _DllMainCRTStartup 34237->34238 34238->34180 34242 25c757d5868 34239->34242 34241 25c757d584f 34241->34235 34243 25c757d5878 _CRT_INIT 34242->34243 34244 25c757d58be 34243->34244 34245 25c757d4728 _calloc_crt RtlFreeHeap 34243->34245 34244->34241 34246 25c757d589a _CRT_INIT 34245->34246 34246->34244 34247 25c757d58b7 34246->34247 34248 25c757d58cd 34246->34248 34251 25c757d58ec RtlFreeHeap _ioinit _lock __addlocaleref 34247->34251 34250 25c757cf244 free RtlFreeHeap 34248->34250 34250->34244 34251->34244 34253 25c757bcb94 34252->34253 34255 25c757c2f87 _DllMainCRTStartup 34252->34255 34253->34190 34254 25c757cf284 malloc RtlFreeHeap 34254->34255 34255->34253 34255->34254 34256 25c757ceaa8 _DllMainCRTStartup RtlFreeHeap 34255->34256 34256->34255 34257->34196 34258->34201 34259->34198 34260->34210 34261->34208 34262->34216 34264 25c757c5fec _DllMainCRTStartup RtlFreeHeap 34263->34264 34265 25c757c5e51 _DllMainCRTStartup 34264->34265 34266 25c757c5e9f GetUserNameA 34265->34266 34267 25c757c5ec8 34266->34267 34274 25c757bf008 34267->34274 34270 25c757c5ee5 strrchr _DllMainCRTStartup 34281 25c757cf63c 34270->34281 34272 25c757c5fa0 _DllMainCRTStartup 34272->34220 34273->34222 34275 25c757bf014 _DllMainCRTStartup 34274->34275 34276 25c757bf02f WSASocketA 34275->34276 34277 25c757bf058 WSAIoctl 34276->34277 34278 25c757bf051 GetModuleFileNameA 34276->34278 34280 25c757bf099 closesocket 34277->34280 34278->34270 34280->34278 34284 25c757cf66e memcpy_s 34281->34284 34282 25c757cf673 34290 25c757d1d18 RtlFreeHeap _getptd_noexit 34282->34290 34283 25c757cf692 34291 25c757d2528 RtlFreeHeap 12 library calls 34283->34291 34284->34282 34284->34283 34287 25c757cf6c2 34288 25c757cf678 _invalid_parameter_noinfo 34287->34288 34292 25c757d239c RtlFreeHeap 7 library calls 34287->34292 34288->34272 34290->34288 34291->34287 34292->34288 34300 25c757bf118 34293->34300 34295 25c757bf02f WSASocketA 34296 25c757bf058 WSAIoctl 34295->34296 34297 25c757bf051 34295->34297 34298 25c757bf099 closesocket 34296->34298 34297->34154 34298->34297 34301 25c757bf12c 34300->34301 34301->34295 34302 25c73fb88d4 34303 25c73fb8961 34302->34303 34308 25c73fb9324 34303->34308 34305 25c73fb8a01 34312 25c73fb96b4 34305->34312 34307 25c73fb8a8f 34311 25c73fb935e 34308->34311 34309 25c73fb9455 VirtualAlloc 34310 25c73fb9479 34309->34310 34310->34305 34311->34309 34311->34310 34315 25c73fb9723 34312->34315 34313 25c73fb994f 34313->34307 34314 25c73fb976e LoadLibraryA 34314->34315 34315->34313 34315->34314

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _snprintf$strchr$AvailableDataInternetQuery_errno_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2459009813-0
                                        • Opcode ID: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                        • Instruction ID: 071a598ed97edd8e24e25ad2ef39bc25bc81c78aae947aa614a954e69e52b133
                                        • Opcode Fuzzy Hash: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                        • Instruction Fuzzy Hash: E6819431A28F484FE755EB14D8C96A9B3E9FB98312F10056DE84AC3291EE34DD06CB85

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Name$FileModuleUser_snprintfmallocstrrchr
                                        • String ID:
                                        • API String ID: 1730036252-0
                                        • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
                                        • Instruction ID: 2147688614abea66b04c3ba66904fd4795c450e8450c0e1825b6b1862440e1bb
                                        • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
                                        • Instruction Fuzzy Hash: 3B517830728F080FEA58AB6C98997B9B2D6E78D301F20455DE48FC3693E934DC028745

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 55 25c757bca74-25c757bcbd6 call 25c757c5fec call 25c757c61e8 * 3 call 25c757cb454 call 25c757cb464 * 2 call 25c757cb434 * 2 call 25c757cb454 * 2 call 25c757cf284 call 25c757cb434 * 3 call 25c757cb464 call 25c757cc230 call 25c757c34a0 call 25c757ceaa8 * 2 call 25c757bf3c0 98 25c757bcbd8 call 25c757cda74 55->98 99 25c757bcbdd-25c757bcbf2 call 25c757cb434 call 25c757bf1e4 55->99 98->99 105 25c757bcbf9-25c757bcc07 call 25c757bf1f8 99->105 106 25c757bcbf4 call 25c757cda74 99->106 110 25c757bcc09 call 25c757cda74 105->110 111 25c757bcc0e-25c757bcc15 call 25c757bf274 105->111 106->105 110->111 115 25c757bcc17 call 25c757cda74 111->115 116 25c757bcc1c-25c757bcc55 call 25c757cb464 call 25c757cb434 call 25c757cf284 111->116 115->116 124 25c757bcc57 call 25c757cda74 116->124 125 25c757bcc5c-25c757bcc90 call 25c757cb434 call 25c757ceaa8 call 25c757cb434 call 25c757c5c60 116->125 124->125 135 25c757bcebb-25c757bcee7 call 25c757cc218 call 25c757cf244 call 25c757cda74 125->135 136 25c757bcc96-25c757bcc9e 125->136 137 25c757bcca2-25c757bcd24 call 25c757cbfc0 call 25c757cf63c call 25c757cbfc0 call 25c757cf63c * 2 call 25c757c2ee0 136->137 156 25c757bcd44-25c757bcd77 call 25c757bea48 call 25c757cb434 call 25c757be9f4 137->156 157 25c757bcd26-25c757bcd2b 137->157 168 25c757bcd79-25c757bcd87 call 25c757cad44 156->168 169 25c757bcd9c-25c757bcd9f 156->169 158 25c757bcd2e-25c757bcd35 157->158 158->158 160 25c757bcd37-25c757bcd3a 158->160 160->156 162 25c757bcd3c-25c757bcd3f call 25c757c31f4 160->162 162->156 177 25c757bcd89-25c757bcd93 call 25c757c8e0c 168->177 178 25c757bcd95-25c757bcd99 168->178 170 25c757bcda5-25c757bcdc8 call 25c757c6b98 call 25c757cb434 169->170 171 25c757bce26-25c757bce27 169->171 187 25c757bcdca 170->187 188 25c757bcdcf-25c757bcdf0 call 25c757c18c4 call 25c757c5144 call 25c757c4a04 call 25c757bf3c0 170->188 173 25c757bce2c-25c757bce38 call 25c757be9c8 call 25c757bf3c0 171->173 189 25c757bce3a call 25c757cda74 173->189 190 25c757bce3f-25c757bce5d call 25c757cbf04 173->190 177->169 178->169 187->188 216 25c757bcdfa-25c757bce01 188->216 217 25c757bcdf2-25c757bcdf5 call 25c757bf484 188->217 189->190 198 25c757bce64-25c757bce6c 190->198 199 25c757bce5f call 25c757cda74 190->199 198->135 202 25c757bce6e-25c757bce76 198->202 199->198 204 25c757bce78-25c757bce89 202->204 205 25c757bcea4 call 25c757c211c 202->205 208 25c757bce8b-25c757bce9a call 25c757bf3a0 204->208 209 25c757bce9c 204->209 213 25c757bcea9-25c757bceb5 205->213 211 25c757bce9e-25c757bcea0 208->211 209->211 211->205 215 25c757bcea2 211->215 213->135 213->137 215->205 216->173 219 25c757bce03-25c757bce24 call 25c757be9c8 call 25c757bea48 call 25c757bec04 216->219 217->216 219->173
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                        • String ID:
                                        • API String ID: 74200508-0
                                        • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
                                        • Instruction ID: 115a2efc923f2900ace27959650d6e31a4771502730976c074973e862a72a691
                                        • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
                                        • Instruction Fuzzy Hash: 72D19920624F454FEB54B7248CDA3A9F2EDEB8C302F6145ADA446C3AD3FE349D05CA49

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: IoctlSocketclosesocket
                                        • String ID: _Cy
                                        • API String ID: 3445158922-1085951347
                                        • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                        • Instruction ID: da01755540ed28102ef89ded1d66c49e783fc76424dd89a129ae0c1ba712c6a8
                                        • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                        • Instruction Fuzzy Hash: 64319530918F484FD7549E2898C8766B7E5EBA8315F21466EE44AC32A1EB34C942CB45

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$ConnectOpen
                                        • String ID:
                                        • API String ID: 2790792615-0
                                        • Opcode ID: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
                                        • Instruction ID: ca60bfb6fb1bbe6ca61bea3e1f7ea65d3252813548f376f403efd04f46516372
                                        • Opcode Fuzzy Hash: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
                                        • Instruction Fuzzy Hash: 06519830628F044FEB59DB18D8D9769B3E9FB4C305F21046DE48BC7692EA789D06CB46

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                        • Instruction ID: 6412084bef716448d45d398ee03edbe7de462d632996b66f53c632c993610193
                                        • Opcode Fuzzy Hash: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                        • Instruction Fuzzy Hash: 1A718636219F8486CAA0CB1AE49035AB7A4F7C8B94F508125EFCE83B69DF3DD555CB04

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 343 25c73fb9324-25c73fb9358 344 25c73fb935e-25c73fb9374 343->344 345 25c73fb944d-25c73fb9453 343->345 344->345 349 25c73fb937a-25c73fb93c2 344->349 346 25c73fb9455-25c73fb9474 VirtualAlloc 345->346 347 25c73fb9479-25c73fb9482 345->347 346->347 351 25c73fb93ce-25c73fb93d4 349->351 352 25c73fb93d6-25c73fb93de 351->352 353 25c73fb9402-25c73fb9408 351->353 352->353 354 25c73fb93e0-25c73fb93e6 352->354 353->345 355 25c73fb940a-25c73fb9445 353->355 354->353 356 25c73fb93e8-25c73fb9400 354->356 355->345 356->351
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                        • Instruction ID: be3f4f59f3395caee663be3887b8ddb5f445a7c9a9e0d9e083f8c455e5c380f7
                                        • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                        • Instruction Fuzzy Hash: F941BA76628B84C7DB50CB19E44471AB7A5F3C8B94F105125FADE83BA8DB3CD4518F04

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 454 48f220-48f2d2 call 48f360 call 48d500 call 48b5c0 460 48f2d7-48f354 454->460
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3468748922.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                        • Associated: 00000000.00000002.3468732052.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3468821729.00000000004DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469077174.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469098913.00000000007BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469121315.00000000007C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469139102.00000000007CE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.0000000000816000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469287065.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469301523.0000000000821000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469318099.0000000000822000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_420000_mode11_buqd.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2a83c295b55d1fb3924cfc6086ff6026e810ee76d85704118357723c5304dc2
                                        • Instruction ID: 5dea1a7c60ea6db613da8a8420ba4a5fd7b661128deb9cfa87656a62accfbd76
                                        • Opcode Fuzzy Hash: a2a83c295b55d1fb3924cfc6086ff6026e810ee76d85704118357723c5304dc2
                                        • Instruction Fuzzy Hash: 22319C6391CFC482D2219B25B5413AAB364F7A9788F15A715EFC812A1ADB38E1E5CB40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 471 48b5c0-48b5c5 call 4921e0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3468748922.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                        • Associated: 00000000.00000002.3468732052.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3468821729.00000000004DD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469077174.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469098913.00000000007BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469121315.00000000007C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469139102.00000000007CE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469169953.0000000000816000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469287065.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469301523.0000000000821000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3469318099.0000000000822000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_420000_mode11_buqd.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f426410239744f5ba57e2b78151ac65bfe157d6a2c0a85e8369f5e0dce230c44
                                        • Instruction ID: 261a0a6df1470e50db678c7131a460da8565a27646ed6dcf204cff58353409f4
                                        • Opcode Fuzzy Hash: f426410239744f5ba57e2b78151ac65bfe157d6a2c0a85e8369f5e0dce230c44
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                        • String ID: $@
                                        • API String ID: 3318157856-1077428164
                                        • Opcode ID: 0917c7b026fa98026fd61c82a9db6b94b013ed73c29c4ccbf17a38093d3ada48
                                        • Instruction ID: fe871c7bc5c119a81140e4d861d1ba2c66da3c2586e88dec0ef72683969039cd
                                        • Opcode Fuzzy Hash: 0917c7b026fa98026fd61c82a9db6b94b013ed73c29c4ccbf17a38093d3ada48
                                        • Instruction Fuzzy Hash: 2452C42A6E4F499DFF658A14DD4836DEAA8F7C9FC6F340045DA6606ED4E738C8408F08
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                        • String ID: $@
                                        • API String ID: 3613058218-1077428164
                                        • Opcode ID: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
                                        • Instruction ID: 90863fafb00a5320825d059110099e503d73c0f25f71fb04e285d5244f0f06ad
                                        • Opcode Fuzzy Hash: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
                                        • Instruction Fuzzy Hash: C262B570928F4D8FE7698A188CCA779F7F9FB59312F34029DD486829D1E6359C02CE49
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                        • String ID:
                                        • API String ID: 3613058218-3916222277
                                        • Opcode ID: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
                                        • Instruction ID: 3141a5d71d3d68bee15496921a0ee5db1d6c22d84c8abc5f826a074565bd0504
                                        • Opcode Fuzzy Hash: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
                                        • Instruction Fuzzy Hash: 5062E931528F594FE7689A188CCA369F7F9FB99312F34019DD486839D2F6369C03CA49
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                        • String ID: -$0
                                        • API String ID: 3246410048-417717675
                                        • Opcode ID: 9d83564e1f44511746efc6243833ea10ca1e0c0cc6e5e094e442fc0115aecad6
                                        • Instruction ID: 3ecec17c7dc635acf9eefcc389f67c61aef0557261ee66a02708666851f17505
                                        • Opcode Fuzzy Hash: 9d83564e1f44511746efc6243833ea10ca1e0c0cc6e5e094e442fc0115aecad6
                                        • Instruction Fuzzy Hash: AF42D92A6E4F8899FB648A149D4836DEBA8F789FC6F340045DA6546ED4F739C850CF08
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __doserrno_errno_invalid_parameter_noinfo
                                        • String ID: U
                                        • API String ID: 3902385426-4171548499
                                        • Opcode ID: 1e306023ed328bab19b7a5d60cdebdd92491a2c212ad1309fcb9b443deab4914
                                        • Instruction ID: aa08da233bd2b9bf1266441c4d7022687b5c5c354deff7e091705c5b9256b3eb
                                        • Opcode Fuzzy Hash: 1e306023ed328bab19b7a5d60cdebdd92491a2c212ad1309fcb9b443deab4914
                                        • Instruction Fuzzy Hash: 3212D7762A4F418EEB108F25D84836AE7A8F7C8FD6F640156DA5D43E94EB39C445CF08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3442832105-0
                                        • Opcode ID: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                        • Instruction ID: f900e2f722c6e3d9833fdced654ead91e586b0c666dfae87e375f7468508886f
                                        • Opcode Fuzzy Hash: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                        • Instruction Fuzzy Hash: 9152B320128E899BE759AB2CD8867E4F3F8FF68306F515248D985C7552FB30D983CB85
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3442832105-0
                                        • Opcode ID: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                        • Instruction ID: e08c2462fe5306308f2ba8bae10f8cfc827f0e507bdbe8f7942787f360c969de
                                        • Opcode Fuzzy Hash: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                        • Instruction Fuzzy Hash: 8142C5A9224F8496EA158B3CE4053E8E3A4FF5CB9AF145101DF9917F61FF38D2A68704
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $<$ailure #%d - %s$e '
                                        • API String ID: 0-963976815
                                        • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                        • Instruction ID: 54fbe1ec4d878f0d3fa1889cc00421b38bbb8ae764f13e105024d4c5bd5c6975
                                        • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                        • Instruction Fuzzy Hash: 539211B6325A8087DB58CB1DE4A573AB7A1F3C8B80F54512AEB9B87794DE3CC451CB04
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ailure #%d - %s$e '
                                        • API String ID: 0-4163927988
                                        • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                        • Instruction ID: 085e75a70b6567b018509f7cdc2de2fb8501464c4923f6471bc99d8e3e68db9d
                                        • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                        • Instruction Fuzzy Hash: AA613CB6224A508BD714CF08E4A562AB7E1F3CCBC5F94421AE39B87B68DA3CD545CF44
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _initp_misc_winsig
                                        • String ID:
                                        • API String ID: 2710132595-0
                                        • Opcode ID: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
                                        • Instruction ID: b8d95712fefb2edcad51bf9f6d4429a8b6cb12ed6418735bbcde0effe94d325e
                                        • Opcode Fuzzy Hash: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
                                        • Instruction Fuzzy Hash: 98A1EC71619A098FEF54EFB5EC98AAA37B2F768301721893A904AC3174DABCD545CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                        • Instruction ID: e789ed3a6711873bbb9b95ea505b97dfa11f015d12ae2284f237b4ddc649426e
                                        • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                        • Instruction Fuzzy Hash: C8620A31228A558FD31CCB1CC5B1B7AB7E1FB89340F44896DE287CB692C639DA45CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                        • Instruction ID: 4ec21e6ef24db2c558cd74755bca9e96f7324784894a935f30035dc705b95dcc
                                        • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                        • Instruction Fuzzy Hash: E852EE312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639D545CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                        • Instruction ID: d75c6b9447cbfe2cefef023f532507428db4f456ff1c508935d92e33200f4322
                                        • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                        • Instruction Fuzzy Hash: 10525FB6214A418BD708CB1CE4A573AB7E1F3C9B81F44852AE7978BB99CA3DD544CF04
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                        • Instruction ID: 0209f090b908fbfb00719d74ca6298a3c5c953bcf3c55120d69963f10f8a5e22
                                        • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                        • Instruction Fuzzy Hash: 7A5264B6214A808BD708CB1DE4A573AB7E1F3CDB80F44852AE79687799CA3DD540CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 037a88b3a0e0121372c1e8929510804f124a0a98294513f128062ea9428e9fbd
                                        • Instruction ID: a52fdec8e92e8681baded6b775f310b89fa3114010e4d3e8a7b0d6d9f2da7dd2
                                        • Opcode Fuzzy Hash: 037a88b3a0e0121372c1e8929510804f124a0a98294513f128062ea9428e9fbd
                                        • Instruction Fuzzy Hash: 7CF1A92A364F458AEB20DA19DC4439FA3A8F79EBC5F600061DA6987F85FA34C905CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f74bee57ece39a3ee739721ddd6b8b7c874878cbec99e002ba7fd2a6b2694298
                                        • Instruction ID: 5ab51968ad1e8b33738ee3ae992ce8b84801e471445d7aedc548adc8849b054a
                                        • Opcode Fuzzy Hash: f74bee57ece39a3ee739721ddd6b8b7c874878cbec99e002ba7fd2a6b2694298
                                        • Instruction Fuzzy Hash: E2E1F6A76A0B408BFB608B35EC543A9A3A5F74DBC6F144161DB9A83F91EA3CE041C704
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: a24fb40c631e4fb8bf858a82f26ba5d2e30cdac9459d39304e37b5ee64eada3e
                                        • Instruction ID: 4fdd1a2f7d3458e004c5bf3dd713997b1c697851f0f0b80960cc0399b3f5c784
                                        • Opcode Fuzzy Hash: a24fb40c631e4fb8bf858a82f26ba5d2e30cdac9459d39304e37b5ee64eada3e
                                        • Instruction Fuzzy Hash: D0E1F92A364F4649EF109A58DC4479FE3A8F79EBC9FA00061DE5987E85FA34C905CB44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                        • Instruction ID: 65984f9eb62fe3327c4158a1dae3dadd9fb7d9301054138468adfd009c9cbde6
                                        • Opcode Fuzzy Hash: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                        • Instruction Fuzzy Hash: 45718D7A264F418AEB608F35E858B5DB3A8F74DFC6F201065DA6943E94EF38C4448F49
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 388111225-0
                                        • Opcode ID: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
                                        • Instruction ID: e8e6f1563904984eb0bd0d8d5ca13263a7a1bde207d09123f5e0c5ab4d84e721
                                        • Opcode Fuzzy Hash: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
                                        • Instruction Fuzzy Hash: 4E31F670228F444FE315AF78CCCB368B6E8EB4A322F714699E416876D3E6349C41CB95
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: write_multi_char$write_string$free
                                        • String ID:
                                        • API String ID: 2630409672-3916222277
                                        • Opcode ID: 1c8d6b8a065489df9c71b2e8ea70d157333f6dd13db57c526a3ea5ce9db962ed
                                        • Instruction ID: 8ae9469e2ba262e33bf2b1b8a5702cf9f459d69f354e4d99bb7da575ef8adfb6
                                        • Opcode Fuzzy Hash: 1c8d6b8a065489df9c71b2e8ea70d157333f6dd13db57c526a3ea5ce9db962ed
                                        • Instruction Fuzzy Hash: C4A1E62A6E4F4489FB21CB559C0839EABA8F7C9BC5F340042DE6957E95EB38C944CF04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                        • String ID:
                                        • API String ID: 2644381645-0
                                        • Opcode ID: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
                                        • Instruction ID: 61c51d75f6159879799a80b49e8cfe7e22b2bc78ec86f0f10fbc96c756ef8e3f
                                        • Opcode Fuzzy Hash: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
                                        • Instruction Fuzzy Hash: B721F830628F080FF3156B689CCB369B6E8EB49323F3505C9E0198B5D3F6745C41CAA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                        • String ID:
                                        • API String ID: 1078912150-0
                                        • Opcode ID: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
                                        • Instruction ID: b2d252a0fed0aff50952d4ccb9608a567c50bc9ee20c579998b8ef2cef738af8
                                        • Opcode Fuzzy Hash: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
                                        • Instruction Fuzzy Hash: F8210A31628F000FF3156B68DCCB37CB6E8DB4A322F350688E0564B6D3E6745C41CAA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 388111225-0
                                        • Opcode ID: 9a7e94428e85d4ed5cd8e77b1af53c202f15bf406c2c29a1a7d54b8e8c205bff
                                        • Instruction ID: 1bc4e18fee31db9b5acdcd930de53b783fc82564dd8e82abd6486924bf229f8f
                                        • Opcode Fuzzy Hash: 9a7e94428e85d4ed5cd8e77b1af53c202f15bf406c2c29a1a7d54b8e8c205bff
                                        • Instruction Fuzzy Hash: 023105262E4F408DE7116F619C4935DA558ABC9FD2F7841A5A93117FD3E638C451CF08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 1812809483-0
                                        • Opcode ID: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                        • Instruction ID: 161c3c2cabc9d7a5d1714696fb3e2e7c32576103e849681dfe2d5f62b3b7c57a
                                        • Opcode Fuzzy Hash: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                        • Instruction Fuzzy Hash: 8D41E37D6F2B5189FB609B118C183E9E298E79CFE6FB041619A7443EC5F63889518F08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                        • String ID:
                                        • API String ID: 2464146582-0
                                        • Opcode ID: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
                                        • Instruction ID: ef19d093ecc198992b669a4b2f118b30e618f0eb79bfc51fe2fe91b4cec762f8
                                        • Opcode Fuzzy Hash: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
                                        • Instruction Fuzzy Hash: D221D830628F404FF3156B68DCCB37DB6E4DB49322F354599E016876D3E6745C41CAA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                        • String ID:
                                        • API String ID: 2140805544-0
                                        • Opcode ID: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
                                        • Instruction ID: 398ff6a2992e83e458bc46b8cc4a71decee0494730c31ea07ce56bf48bee4a9b
                                        • Opcode Fuzzy Hash: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
                                        • Instruction Fuzzy Hash: A321F631126F144FF3156B748CDB368B6F8EB49322F750598E41A875D3E6744C41CBA9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                                        • String ID:
                                        • API String ID: 4140391395-0
                                        • Opcode ID: 19101616f3e261a9beafbca214444aa2a5cb8e231afb96d714edbab2d78f6c11
                                        • Instruction ID: 977a6a320ddec1f2b65747ace59c347f5d9b6bc1b575bc03496c0196cdf0a888
                                        • Opcode Fuzzy Hash: 19101616f3e261a9beafbca214444aa2a5cb8e231afb96d714edbab2d78f6c11
                                        • Instruction Fuzzy Hash: 6121CF262E0F404DF6012B259C0A3ADE518A7C8FF2F394784AA3507BE2E738C4518B28
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                                        • String ID:
                                        • API String ID: 310312816-0
                                        • Opcode ID: 58556fb0ae643294109593e6a1f551c1d1756168c239dbf47c2b40feda9217b5
                                        • Instruction ID: 2c91a71833238b033c69a4a67cbecf2b23f5ccd0119b88baf1ba8819511ebfa6
                                        • Opcode Fuzzy Hash: 58556fb0ae643294109593e6a1f551c1d1756168c239dbf47c2b40feda9217b5
                                        • Instruction Fuzzy Hash: 0621CF2A6E4F404DF7012F259C493ADE558A7C8FE3F394195AA3507AD2FA788851CB1C
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$FreeHeap_errno
                                        • String ID:
                                        • API String ID: 2737118440-0
                                        • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                        • Instruction ID: 87c93266f5883042450c8254b8fca1e4c53ac381d5340f486d5db31d5949e490
                                        • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                        • Instruction Fuzzy Hash: 81416030261F498FFB94EB58DCE9B68B2E8F758317F7150A99406C25D1EA7C8D42CB14
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno
                                        • String ID:
                                        • API String ID: 2288870239-0
                                        • Opcode ID: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                        • Instruction ID: 899ccda022dd7103bd9828445207ef37380d7757d48c6169144626fbca557b54
                                        • Opcode Fuzzy Hash: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                        • Instruction Fuzzy Hash: 53312B6D2F1F418DFB549B25EC6D364926CAB5CFD2F2801A5D93906EE1AE3880048A19
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 1812809483-0
                                        • Opcode ID: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                        • Instruction ID: c2e993227efd60a85b8bf653ae4170bd682f0f5d663e1747b09c20b9b1a91ea9
                                        • Opcode Fuzzy Hash: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                        • Instruction Fuzzy Hash: D4510B30124F1A4FE764AB258CCA3A5B2F4EB5C313F74019AA455C79DAF6348C43CB99
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                                        • String ID:
                                        • API String ID: 2611593033-0
                                        • Opcode ID: 268773e762f2e10da4a59bd6545c27f05d9dc8848c407f150f864121acff7d22
                                        • Instruction ID: 5521a72fa82e68a9500d11217528506d162e6dcc738b578d88914c114a15318e
                                        • Opcode Fuzzy Hash: 268773e762f2e10da4a59bd6545c27f05d9dc8848c407f150f864121acff7d22
                                        • Instruction Fuzzy Hash: 8721256A6E0F444DF7012F229D493BDE55877C8FE3F354184AA3907BD2E67888518F18
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                                        • String ID:
                                        • API String ID: 4060740672-0
                                        • Opcode ID: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                        • Instruction ID: c833d57d75e19779346831d05576d78943b6ccefa987d2c1dd564dc1424cbb3c
                                        • Opcode Fuzzy Hash: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                        • Instruction Fuzzy Hash: 1C1102662E0F814DF3052F269C4D3ACE518A7C8FE3F394694953947AE2E678C4518F18
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$malloc$_errno$_callnewh
                                        • String ID:
                                        • API String ID: 4160633307-0
                                        • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
                                        • Instruction ID: 5290138aa6336c6f4b6fd0bd10dd71a881979985a077aeaf0af32bd643534173
                                        • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
                                        • Instruction Fuzzy Hash: C4919C20F24F494FD759AA5C5C96779B3EBE789701F61029DD446C3693FE309C02CA8A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$malloc$_errno$_callnewh
                                        • String ID:
                                        • API String ID: 4160633307-0
                                        • Opcode ID: 930309f8498ff7a349f5473874db00cb4ae22164d30aab4612de4250541046de
                                        • Instruction ID: e4450ab177a60495953df148e09606dbf300f6c4eb19c3e7740386c161a62179
                                        • Opcode Fuzzy Hash: 930309f8498ff7a349f5473874db00cb4ae22164d30aab4612de4250541046de
                                        • Instruction Fuzzy Hash: 42714B6A360B844EEB109B2A9C4876AF799B79AFC5F2040569D5607F86FF39C405CF08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2917016420-0
                                        • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
                                        • Instruction ID: 0912dedb9b74466eca9e5b71d81283e08003df478b6cf72623f2e92fd17bceef
                                        • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
                                        • Instruction Fuzzy Hash: CB31C730624F094FE754AB789C9A369B6E9FB8D312F25419DA44AC32D2E778CC42CB45
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                        • String ID:
                                        • API String ID: 4120058822-0
                                        • Opcode ID: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
                                        • Instruction ID: 50ebca9011cabb2f64d9b174f24b0aa0133117b713b8e3ee1146f524eaa17ce1
                                        • Opcode Fuzzy Hash: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
                                        • Instruction Fuzzy Hash: D3212130624F014FE354AB688CDB369B6F9BB49322F350198E406877D2EA745C40CBAA
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2917016420-0
                                        • Opcode ID: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                        • Instruction ID: 543d9b598f2c188a772f05b75fada6951a564fde42a50bb14f07b1c4ad3b4d83
                                        • Opcode Fuzzy Hash: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                        • Instruction Fuzzy Hash: 9131C3693A1F408AFB109B369C1D359E6D9AB8DFD6F2405649A6543FD5FF38C4108B08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3191669884-0
                                        • Opcode ID: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                        • Instruction ID: 4f17a0a792974899537360e476c0b6097f25bde4d1351e4841f3b58d71380fa2
                                        • Opcode Fuzzy Hash: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                        • Instruction Fuzzy Hash: 7B31937A2E5B8489E7109B11985875DE6A8F7C8FE2F648161AA6403F95EB34C851CF04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                        • String ID:
                                        • API String ID: 2328795619-0
                                        • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                        • Instruction ID: 1700a60572957f4c2c31458a0b4afeafae19c2f78dc5b4d352de0b83638bbbcf
                                        • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                        • Instruction Fuzzy Hash: CA61C431238F094FE628562C5C9E275F2E5E798723F34139ED45AC3AD2FA709C5289C9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                        • String ID:
                                        • API String ID: 2328795619-0
                                        • Opcode ID: a6b8c894bc097219f3410178b0f3ee4aa495d15850340b6c84f373b071b042dd
                                        • Instruction ID: 3fe8e3b5a89b3012e99d2483976cc770cec13f525f5af41ae73b1a2e0805042f
                                        • Opcode Fuzzy Hash: a6b8c894bc097219f3410178b0f3ee4aa495d15850340b6c84f373b071b042dd
                                        • Instruction Fuzzy Hash: 255157693E5B408AFB148A265C08769E688B3CDFF5F344750AE3943FD1EB34C4928E09
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2808835054-0
                                        • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                        • Instruction ID: 8498c601896599b03d2398e14973a8d1025b27fa0c576442f7dc400bd34878f0
                                        • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                        • Instruction Fuzzy Hash: BB317C30228F084FD7549F1898CA769B2E4FB5C312F6506E9A84DC7696EB70DC42CB89
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                        • String ID:
                                        • API String ID: 1547050394-0
                                        • Opcode ID: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
                                        • Instruction ID: aec2ce8209e24fe76f928664fe4a91fa22bc3c4fbe386e7335eaaa00cfb7aab6
                                        • Opcode Fuzzy Hash: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
                                        • Instruction Fuzzy Hash: ED21F770628F0A8FF790AB394C4A76DB2E5EB8D342F2505D99846C3192FB30CC41CB99
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                        • String ID:
                                        • API String ID: 1547050394-0
                                        • Opcode ID: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                        • Instruction ID: c6e8698572fcdea4fe903324a4ec31f3c94e535faa53bf45e80deff5487411aa
                                        • Opcode Fuzzy Hash: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                        • Instruction Fuzzy Hash: CD2108A92B5F8299FB115B329C0935EE29D778CFC1F6444A1996987F86FB3CC4108F08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit
                                        • String ID:
                                        • API String ID: 2102446242-0
                                        • Opcode ID: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                        • Instruction ID: a5ace5dedcb866f6f3845181a6a0c8fd9ec29e44ae8a491a4aab8aea25f3d8ef
                                        • Opcode Fuzzy Hash: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                        • Instruction Fuzzy Hash: 0221F5292E0F814DF7055F659C8D36EE55C97C8FD2F390198963507BD2FA7888418B0C
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                        • String ID: dpoolWait
                                        • API String ID: 2026495703-1875951006
                                        • Opcode ID: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                        • Instruction ID: 366f94d95959c4edda6c2334dadb6565b7ef90e038f2447cbbcea399b83f6d19
                                        • Opcode Fuzzy Hash: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                        • Instruction Fuzzy Hash: 3F01C8B5720B9049EA04DB22BC08759A69DF7ACFD1F25425AEE7947BC6DE38C0418B44
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: freemallocstrchr$FreeHeap_errnorand
                                        • String ID:
                                        • API String ID: 3504763109-0
                                        • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
                                        • Instruction ID: 869e3c3c199e9f144b068cf41c8d35de08646938377022ec46cc930b77874d8a
                                        • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
                                        • Instruction Fuzzy Hash: 5681F820228F8C4FE755AB2C98993F9F3E8FF9D306F1101A99585C7592EA308D47CB45
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: freemallocstrchr$rand
                                        • String ID:
                                        • API String ID: 1305919620-0
                                        • Opcode ID: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                        • Instruction ID: 48e74682846e4e7d98af5e7d88df55eb1ad5367c2c560bcb94c15066cad22abb
                                        • Opcode Fuzzy Hash: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                        • Instruction Fuzzy Hash: F0714B95664FC459FA259B39AC083EAE390EF9CFC5F280151DB9507F96FE38C1428B08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
                                        • Instruction ID: df5413d93ddbda485dd959ba25568757434c461ac0d02dd94bf6710f296a3eed
                                        • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
                                        • Instruction Fuzzy Hash: B751CF34A24F094FDB599B2898956B9B7EAF74D311F50016DD84BC3647FA30DC02CA89
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: 3866d312ddc7406d2c13ac3d10959d9d3de063b9a6b1dce899036bf231b32379
                                        • Instruction ID: cc51078617b73ffcfd4d0b39c6970bef326c6e9977d941d69c93095cb2eb2095
                                        • Opcode Fuzzy Hash: 3866d312ddc7406d2c13ac3d10959d9d3de063b9a6b1dce899036bf231b32379
                                        • Instruction Fuzzy Hash: 94412329360B818FEB94DB2AAC18759A768B75EFC2F640061CE2547F41FF34C412CB08
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strtok$_getptd_time64malloc
                                        • String ID: eThreadpoolTimer
                                        • API String ID: 1522986614-2707337283
                                        • Opcode ID: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                        • Instruction ID: 19b200e3034793105690978381881be4c922b26f3cc44bada0bd05a436ba02d8
                                        • Opcode Fuzzy Hash: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                        • Instruction Fuzzy Hash: 12212BB66A0F9449EB00DF11E84C25CB7ACF39CFD1F254195EE2A43B81DA30C8418B44
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: malloc$_snprintf$_errno_time64freestrtok$_callnewhrealloc
                                        • String ID:
                                        • API String ID: 1314452303-0
                                        • Opcode ID: a14b20026d747f2b5753e6fc705179295a1c2f23b63bad27e5059ac536f54d83
                                        • Instruction ID: 4b49ba0245fd1532cf75312bb7213af044bbde751bbbf9ef14021b9981ede9db
                                        • Opcode Fuzzy Hash: a14b20026d747f2b5753e6fc705179295a1c2f23b63bad27e5059ac536f54d83
                                        • Instruction Fuzzy Hash: AAC1E5692A0F404DFA04EB769D59799A28DAB4EFC2F6040A5A97547FD2FE38C4058F08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                                        • String ID:
                                        • API String ID: 2887643383-0
                                        • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
                                        • Instruction ID: f989f04bc1da335b7381d048000fdc1f7a5f3c918644f5d88d5b43eb2bd30250
                                        • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
                                        • Instruction Fuzzy Hash: F9518B31628F084FD749EB1C98D9779B2E9EB8C311F6042ADA44BC3697ED349D02CA85
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _lock$_calloc_crt_mtinitlocknum
                                        • String ID:
                                        • API String ID: 3962633935-0
                                        • Opcode ID: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
                                        • Instruction ID: 1d8befeb95e744cf01d64a79b109b65bba507e4a14b301fd001e005b7f0cc7d4
                                        • Opcode Fuzzy Hash: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
                                        • Instruction Fuzzy Hash: 6D51C470528F084FE7549F18CC8A375F7E4FB58311F25429DE88AC76A2EA74DC42CA86
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
                                        • Instruction ID: 87b3e51600cc3d9ee3aa597fb89407dc44d461bff9c401ccf4cd7226d6b481e5
                                        • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
                                        • Instruction Fuzzy Hash: 5A41F630628F0D0FE758AA284C8967AB6E9E79A755F64016DD887C3243FD30DC03CB89
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                        • String ID:
                                        • API String ID: 304646821-0
                                        • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
                                        • Instruction ID: 8a8dc2770836d27a15a3dcd9a4989ee2a643986a0f898c87a689c13afd867d15
                                        • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
                                        • Instruction Fuzzy Hash: 87518F30224F084FEB58EF28C8DA765B6E4EB4C311F6402D9D856CB6D6E675CC82CB85
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 343393124-0
                                        • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
                                        • Instruction ID: aca6ae1b7d57d08c53420ae1c353cdae9df3a9ef8e65dbd1153dd7cc03a347c5
                                        • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
                                        • Instruction Fuzzy Hash: E341A72031CE480FE698AB6C68657B4B7EAE78D311F554199D08EC3297FE34AC03CB85
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$_callnewh_fseek_nolock_ftelli64fclose
                                        • String ID:
                                        • API String ID: 1756087678-0
                                        • Opcode ID: f827565397daa4a866320a6784096609c7711a7c42725b9a2a2b01c24697e092
                                        • Instruction ID: 9bcf7f6e7867884633f6ee43566569bbe398260a3358d336c59f114afef2a39f
                                        • Opcode Fuzzy Hash: f827565397daa4a866320a6784096609c7711a7c42725b9a2a2b01c24697e092
                                        • Instruction Fuzzy Hash: F641F569360B408AEA00EB229C197ADE259B7CDFC1F604161AD6E47FD6EF3CC5018F08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 1640621425-0
                                        • Opcode ID: f714c1e563aa58d873e3883a1df435710c86d18d380f096712ab5731ea4c4750
                                        • Instruction ID: 0221937535bc26dc3be2350346fb89d9eccb4d83e37034b9bf5fdeefd64415fc
                                        • Opcode Fuzzy Hash: f714c1e563aa58d873e3883a1df435710c86d18d380f096712ab5731ea4c4750
                                        • Instruction Fuzzy Hash: AF4114B93A1B418EEB289E325D58359F69DB74CFE1F3882609E7547FD1F638C4418A08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: 326b315c93b4297f8d1cd44fbd3c536e1a3741d65750285d3f659b19031d268f
                                        • Instruction ID: d9531decc5e2ba37b12989dda83b67368f4154708d10cc4899f61e78ea1c0254
                                        • Opcode Fuzzy Hash: 326b315c93b4297f8d1cd44fbd3c536e1a3741d65750285d3f659b19031d268f
                                        • Instruction Fuzzy Hash: 34411729374B954AEB01EF2A5C09359A69DB7AEFC6F694060DD3587F41FE38C406CB08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$free$FreeHeap_callnewhfclosefwritemalloc
                                        • String ID:
                                        • API String ID: 415550720-0
                                        • Opcode ID: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
                                        • Instruction ID: 121d9d78a0b615be484bdaebe62ea6d16652195036f5b27cba0f25b807a84f40
                                        • Opcode Fuzzy Hash: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
                                        • Instruction Fuzzy Hash: A0214120638F084FE684B72888997ADF2E5FB9C741F600599A44AC3686FD348D41CB89
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 761449704-0
                                        • Opcode ID: 6cfeb8f42d39390d21f7f655b5309285a784ce0f998201f3a4c834a9ff33a05d
                                        • Instruction ID: 62b1d9c2147d79a3b79006ba518e88ac782c7a818917572bf0e7e5e92ba3e0b3
                                        • Opcode Fuzzy Hash: 6cfeb8f42d39390d21f7f655b5309285a784ce0f998201f3a4c834a9ff33a05d
                                        • Instruction Fuzzy Hash: 8B3106592B0FC00DE6455B326C2D3A5EB5A738EFD1F684091DEB507F96EB38C4428B08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$free$_callnewhfclosefwritemalloc
                                        • String ID:
                                        • API String ID: 1696598829-0
                                        • Opcode ID: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                        • Instruction ID: 5c5e8116328dbb903f084b2d925d095f9e884b79a45bd90ec89bc74a89ae3bef
                                        • Opcode Fuzzy Hash: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                        • Instruction Fuzzy Hash: 1F11F999364F4044EA10E721AC193ADD255A78DFD5F644161AA7D4BFC6EE3CC5018F48
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno_errno
                                        • String ID:
                                        • API String ID: 2964073243-0
                                        • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                        • Instruction ID: 23b903845e428ed4863bd62f38bafb282f37927c0e3098339f3642ac87e25d27
                                        • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                        • Instruction Fuzzy Hash: DF018F30635F088FE755AB348C8A358B2F4BB19327FB506D4E0058BAE2FB390C41CA59
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _getptd_noexit$__doserrno_errno
                                        • String ID:
                                        • API String ID: 2964073243-0
                                        • Opcode ID: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                        • Instruction ID: 8c2cb26da3c9a28644fda7f81bd35de01e880d1b2790fb9e2145be70d63f673a
                                        • Opcode Fuzzy Hash: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                        • Instruction Fuzzy Hash: A4016D6A6F1F444CFA052B248C493ACE1596BD9FE3FB18385D53906BD2F63884214E18
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _snprintf
                                        • String ID:
                                        • API String ID: 3512837008-0
                                        • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                        • Instruction ID: d2ee6a048e21f87fc92c9eeb7f0489298310ccb5ed218c0fdabaabdab1e0635c
                                        • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                        • Instruction Fuzzy Hash: 67917130528F484FEB54EF18DCD9BA9B3F9FB99305F1005A9E846C3292EA34D945CB45
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _snprintf
                                        • String ID:
                                        • API String ID: 3512837008-0
                                        • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                        • Instruction ID: 3c42bef46999b3aee7c5c84dfd349835f5102c7180843384e9b0e87e5144f4e6
                                        • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                        • Instruction Fuzzy Hash: CA817F7A260F8489FB109B65EC483D9B3A8F79DFC5F6401A2DA6903B95EF38C505CB04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                        • String ID:
                                        • API String ID: 2026495703-0
                                        • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
                                        • Instruction ID: 87ec1cab1f3f66ffaa7c72a71411b33ba561e1a4e06c8321380fdc8b8ed0ce67
                                        • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
                                        • Instruction Fuzzy Hash: 5311663162CF044FE798EB6CA499755B6E5F78C311F21459EF04AC3396EA349C428BC5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 634798775-0
                                        • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
                                        • Instruction ID: c7bcf9ac917ff6d336733736668d8555b82dd182d74c57320dd1db7e56e5be8a
                                        • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
                                        • Instruction Fuzzy Hash: 1F51A830228F094FEAA8596D5C8F335B1E4E79C713F3412AD949AC39D2FA71DC52C989
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                        • Instruction ID: bea40b7b4c7c39d3bf7636a8ef47c53d2979cacc1d99f11298f8429924e26770
                                        • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                        • Instruction Fuzzy Hash: 4161AF7A2E1F40CEE7148F299D48768B2ACB35CFD6F3441AAD96547B94EB34C8418F48
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: clock
                                        • String ID:
                                        • API String ID: 3195780754-0
                                        • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                        • Instruction ID: 02b01ca9931147e6bb16518346f7411966dcf8d8cfc7409f4d6adf5e127f7c54
                                        • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                        • Instruction Fuzzy Hash: B8213B3182CB0C0FE768AD9858CA776F3E5D749351F3502ADE88AC3542F9708C42CAC9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                        • String ID:
                                        • API String ID: 4151157258-0
                                        • Opcode ID: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                        • Instruction ID: 95f39b8e510841d4e9356d3bf2868d0a46e08411fdc10dd7f316ade0b2e5285b
                                        • Opcode Fuzzy Hash: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                        • Instruction Fuzzy Hash: 1A21261A1E8BA04CEB604611985833DE698F3E8FD7F3841A1E6B607EC5E93CC451AF08
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: clock
                                        • String ID:
                                        • API String ID: 3195780754-0
                                        • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                        • Instruction ID: 7c765d23926290466d69f921953dab50b99a983be57756b50c6a4e1a54a8498f
                                        • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                        • Instruction Fuzzy Hash: 3C113D66590F468DF374AE797C8432BF598BB8DBD1F390061EE6403A45F930C8418F46
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintfmalloc
                                        • String ID:
                                        • API String ID: 2566950902-0
                                        • Opcode ID: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                        • Instruction ID: 30d8d8d554aaef470bac9e8fa275c69fc7bb547e40b71246ac3e71f5342dc7cc
                                        • Opcode Fuzzy Hash: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                        • Instruction Fuzzy Hash: 4EF09669264F40CDE2509B22BC1939AE269A79CFC1F684161BF5817F56EE38C4018F48
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID: B
                                        • API String ID: 1812809483-1255198513
                                        • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                        • Instruction ID: 57cc9f8bca5e6cca9607a0dcaed2d974f476b117a82389148ee1d03609eae049
                                        • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                        • Instruction Fuzzy Hash: 5511BF30228F084FD744EF1C9889769B3E5FB98325F6043AEA419C32A1DB34C885CB86
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                        • String ID: B
                                        • API String ID: 1812809483-1255198513
                                        • Opcode ID: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                        • Instruction ID: 635bf73add258e8886919d060bfa1d35d47d8cab0a76967a03ae00da1fa1e613
                                        • Opcode Fuzzy Hash: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                        • Instruction Fuzzy Hash: 9F118EB6660F408AEB109B12E848399B668F7A8FE4F644360AB6807B95DF38C154CF04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_calloc_implcalloc
                                        • String ID:
                                        • API String ID: 4000150058-0
                                        • Opcode ID: 1990de878bdb2b18b214190b8058df6cf8cdb58ae8a7ad838a221dc59059176c
                                        • Instruction ID: 29388c5b446d375fbe44ba5e59bc7f35d23bf6ca264e5af4b3751dc303ccdaa4
                                        • Opcode Fuzzy Hash: 1990de878bdb2b18b214190b8058df6cf8cdb58ae8a7ad838a221dc59059176c
                                        • Instruction Fuzzy Hash: 6AC1EB36614F848AE764CF59E88479EB7F8F389B85F204129EA8D47F54EB38C455CB04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
                                        • Instruction ID: 380954e8be81c4dfb43c76a116af1bda4b2ab35dd652b2c2be929e681a3ab9b6
                                        • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
                                        • Instruction Fuzzy Hash: FE618C70624F094FEA58A7189CD97BDB2E9E79C302F31096DA446C3597FE34DD02CA89
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471459246.0000025C757B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025C757B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c757b0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: malloc
                                        • String ID:
                                        • API String ID: 2803490479-0
                                        • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
                                        • Instruction ID: daac5fdbe2c50b975c77305e857d43942bbefd6df67de1a90403b34a6a928046
                                        • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
                                        • Instruction Fuzzy Hash: 8251AA70A28F054FDB589E1C98CA669B3E6F788301F24459DD84BC3686FA30DC12CA45
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free$_errno$_callnewhmalloc
                                        • String ID:
                                        • API String ID: 2761444284-0
                                        • Opcode ID: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                        • Instruction ID: dcc8e85b6c90f2b43604c832ddc242b84fd991bbcc6c535adf94f95947605fc9
                                        • Opcode Fuzzy Hash: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                        • Instruction Fuzzy Hash: BF5106A92A1B0049EE14AB31AD183ADE399B74CFC2F7804659D2A17FD5FA79C501CF18
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3471400157.0000025C73FA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000025C73FA0000, based on PE: true
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF0000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        • Associated: 00000000.00000002.3471428041.0000025C73FF5000.00000004.00000020.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_25c73fa0000_mode11_buqd.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: malloc
                                        • String ID:
                                        • API String ID: 2803490479-0
                                        • Opcode ID: 80bcae34b50f6f3c58066c2fc9d1801100724e039a84313f03cb0366590bdd42
                                        • Instruction ID: e1ff6295ff89b4026dab61ed552fe221027a0df0aa3800ecdff609dadf563992
                                        • Opcode Fuzzy Hash: 80bcae34b50f6f3c58066c2fc9d1801100724e039a84313f03cb0366590bdd42
                                        • Instruction Fuzzy Hash: C9410626660B808BDB54CB2AA90875DB3A8F349FC6F204466DE3A43F85FF35D805CB04